Cursed Silicons Wiki
my_wiki
https://wiki.cursedsilicon.net/wiki/Main_Page
MediaWiki 1.43.1
first-letter
Media
Special
Talk
User
User talk
Cursed Silicons Wiki
Cursed Silicons Wiki talk
File
File talk
MediaWiki
MediaWiki talk
Template
Template talk
Help
Help talk
Category
Category talk
Main Page
0
1
1
2024-08-31T09:24:38Z
MediaWiki default
2
wikitext
text/x-wiki
<strong>MediaWiki has been installed.</strong>
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User's Guide] for information on using the wiki software.
== Getting started ==
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]
11cef88175cf81168a86e7c0327a5b2d7a1920f5
2
1
2024-08-31T09:32:46Z
CursedSilicon
1
wikitext
text/x-wiki
Welcome!
This is my little wiki where I'm going to keep various details about old computers and other various projects
If you...somehow stumbled across this page on accident, perhaps you'd like to check out other places I'm more active!
'''[https://social.restless.systems/@CursedSilicon/ Mastodon]'''
'''[https://www.youtube.com/@CursedSilicon YouTube]'''
489b82b1ffe3c1913e779f87e650fe1c8f5d3979
11
2
2024-08-31T10:07:07Z
CursedSilicon
1
wikitext
text/x-wiki
Welcome!
This is my little wiki where I'm going to keep various details about old computers and other various projects
For now [[Old Computers|here's a page of my old computers]]. I'm constantly expanding the list and documenting everything I can about them
If you...somehow stumbled across this page on accident however, perhaps you'd like to check out other places I'm more active!
'''[https://social.restless.systems/@CursedSilicon/ Mastodon]'''
'''[https://www.youtube.com/@CursedSilicon YouTube]'''
70883294ab374a6cc6a24f198f44bac9c7b9460e
Old Computers
0
2
3
2024-08-31T09:34:32Z
CursedSilicon
1
Created page with "As the title suggests, and indeed why you're here. '''''I have a lot of old computers''''' This page serves as an index catalog of them for easy reference"
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference
357433d13da069451659f8091df0e1714fa42b3a
12
3
2024-08-31T10:08:14Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ]]
fae23fc63c048ecbba49a3ffd8b3d5eb239ec5c0
17
12
2024-08-31T10:31:28Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ]]
=== Sun Microsystems ===
[[Netra X1]]
8c890807d7a06ef4124d9426abf55fda198061cc
18
17
2024-08-31T10:53:53Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference.
== '''NOTE: This list is non-exhaustive as I'm constantly picking up new weird old tech''' ==
=== Acer Inc ===
[[Acer EasyStore H340|Acer EasyStore H340 NAS]]
=== Apple Computers, Inc ===
[[Powermac G4]] "Mirror Drive Door" (MDD)
[[Powermac G5]] Quad
[[eMac G4]]
[[Xserve G4]]
[[Xserve G5]]
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ]]
=== Digital Equipment Corporation ===
[[DEC AlphaServer 2100|DEC AlphaServer 2100 4/275]]
=== Hewlett Packard ===
[[HP MediaSmart EX495]]
=== Sun Microsystems ===
[[Netra X1]]
[[Netra T1]]
[[SunFire Enterprise 420R]]
[[Ultra 10 Workstation]]
=== Whitebox/custom builds ===
[[Worlds Fastest Win98 PC]]
[[Disc Ripper|Disc Ripper aka "Napster"]]
=== Miscellaneous (Anything not 'retro') ===
[[Framework 13]]
[[Main Desktop]]
[[Home Server]]
e1ac06e43baf0b7114c820dee206ffdb466d6795
19
18
2024-08-31T10:54:11Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference.
= '''NOTE: This list is non-exhaustive as I'm constantly picking up new weird old tech''' =
=== Acer Inc ===
[[Acer EasyStore H340|Acer EasyStore H340 NAS]]
=== Apple Computers, Inc ===
[[Powermac G4]] "Mirror Drive Door" (MDD)
[[Powermac G5]] Quad
[[eMac G4]]
[[Xserve G4]]
[[Xserve G5]]
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ]]
=== Digital Equipment Corporation ===
[[DEC AlphaServer 2100|DEC AlphaServer 2100 4/275]]
=== Hewlett Packard ===
[[HP MediaSmart EX495]]
=== Sun Microsystems ===
[[Netra X1]]
[[Netra T1]]
[[SunFire Enterprise 420R]]
[[Ultra 10 Workstation]]
=== Whitebox/custom builds ===
[[Worlds Fastest Win98 PC]]
[[Disc Ripper|Disc Ripper aka "Napster"]]
=== Miscellaneous (Anything not 'retro') ===
[[Framework 13]]
[[Main Desktop]]
[[Home Server]]
95548b9d2684725be9a343d487224dc5e333f8bb
20
19
2024-08-31T10:54:47Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference.
<big>'''NOTE: This list is non-exhaustive as I'm constantly picking up new weird old tech'''</big>
=== Acer Inc ===
[[Acer EasyStore H340|Acer EasyStore H340 NAS]]
=== Apple Computers, Inc ===
[[Powermac G4]] "Mirror Drive Door" (MDD)
[[Powermac G5]] Quad
[[eMac G4]]
[[Xserve G4]]
[[Xserve G5]]
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ]]
=== Digital Equipment Corporation ===
[[DEC AlphaServer 2100|DEC AlphaServer 2100 4/275]]
=== Hewlett Packard ===
[[HP MediaSmart EX495]]
=== Sun Microsystems ===
[[Netra X1]]
[[Netra T1]]
[[SunFire Enterprise 420R]]
[[Ultra 10 Workstation]]
=== Whitebox/custom builds ===
[[Worlds Fastest Win98 PC]]
[[Disc Ripper|Disc Ripper aka "Napster"]]
=== Miscellaneous (Anything not 'retro') ===
[[Framework 13]]
[[Main Desktop]]
[[Home Server]]
30003a27d4bc6b7593ff40c2956bff67b04d2c3b
21
20
2024-09-01T00:54:08Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference.
<big>'''NOTE: This list is non-exhaustive as I'm constantly picking up new weird old tech'''</big>
=== Acer Inc ===
[[Acer EasyStore H340|Acer EasyStore H340 NAS]]
=== Apple Computers, Inc ===
[[Powermac G4]] "Mirror Drive Door" (MDD)
[[Powermac G5]] Quad
[[eMac G4]]
[[Xserve G4]]
[[Xserve G5]]
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ]]
=== Digital Equipment Corporation ===
[[DEC AlphaServer 2100|DEC AlphaServer 2100 4/275]]
=== Hewlett Packard ===
[[HP MediaSmart EX495]]
=== Sun Microsystems ===
[[Netra X1]]
[[Netra T1]]
[[SunFire Enterprise 420R]]
[[Ultra 10 Workstation]]
=== Whitebox/custom builds ===
[[Worlds Fastest Win98 PC]]
[[Disc Ripper|Disc Ripper aka "Napster"]]
=== Miscellaneous (Anything not 'retro') ===
[[Framework 13]]
[[Main Desktop]]
[[Home Server]]
[[Hyve Zeus]]
[[Hyve Cygnus]]
9ca54b57dce0b3ed75178fa47c82dddc0e874067
23
21
2024-09-02T10:09:51Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference.
<big>'''NOTE: This list is non-exhaustive as I'm constantly picking up new weird old tech'''</big>
=== Acer Inc ===
[[Acer EasyStore H340]]
=== Apple Computers Inc ===
[[Powermac G4]] "Mirror Drive Door" (MDD)
[[Powermac G5]] Quad
[[eMac G4]]
[[Xserve G4]]
[[Xserve G5]]
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ|Cobalt RaQ4]]
=== Dell Computers ===
[[PowerEdge 2500]]
=== Digital Equipment Corporation ===
[[DEC AlphaServer 2100|DEC AlphaServer 2100 4/275]]
=== Hewlett Packard ===
[[HP MediaSmart EX495]]
[[HP KAYAK XA 6/400 MT]]
=== Silicon Graphics ===
[[SGI Octane]]
[[SGI Visual Workstation 320]]
=== Sun Microsystems ===
[[Netra X1]]
[[Netra T1]]
[[SunFire Enterprise 420R]]
[[Ultra 10 Workstation]]
[[Unknown Sun Equipment]]
=== Whitebox/custom builds ===
[[Windows 98 PC|World's Fastest Windows 98 PC]]
[[Disc Ripper|Disc Ripper aka "Napster"]]
=== Miscellaneous (Anything not 'retro') ===
[[Framework 13]]
[[Main Desktop]]
[[Home Server]]
[[Hyve Zeus]]
[[Hyve Cygnus]]
[[Video Capture PC]]
db83e91e25b23049625d69ada19c62bd030605cb
Cobalt Qube
0
3
4
2024-08-31T09:35:52Z
CursedSilicon
1
Created page with "Actually I have *two* Cobalt Qubes. Which one are you interested in? Cobalt Qube 2 (MIPS) Cobalt Qube 3 (AMD K6, x86)"
wikitext
text/x-wiki
Actually I have *two* Cobalt Qubes. Which one are you interested in?
Cobalt Qube 2 (MIPS)
Cobalt Qube 3 (AMD K6, x86)
270d0329ba58d644bbc467df5e1d27ccc55dd8fb
5
4
2024-08-31T09:36:23Z
CursedSilicon
1
wikitext
text/x-wiki
Actually I have '''''two''''' Cobalt Qubes. Which one are you interested in?
Cobalt Qube 2 (MIPS)
Cobalt Qube 3 (AMD K6, x86)
a80c553d923dd5db2a8f118606d5797d9ee9877d
9
5
2024-08-31T10:00:12Z
CursedSilicon
1
wikitext
text/x-wiki
Actually I have '''''two''''' Cobalt Qubes. Which one are you interested in?
[[Cobalt Qube 2]] (MIPS)
Cobalt Qube 3 (AMD K6, x86)
c48ce44286a5eb73331cd70eaae72980c30c1ca9
13
9
2024-08-31T10:08:32Z
CursedSilicon
1
wikitext
text/x-wiki
Actually I have '''''two''''' Cobalt Qubes. Which one are you interested in?
[[Cobalt Qube 2]] (MIPS)
[[Cobalt Qube 3]] (AMD K6, x86)
d743f159f5ab5f1a9b600f464e00a5ed2b010d4b
Cobalt Qube 2
0
4
6
2024-08-31T09:56:02Z
CursedSilicon
1
Created page with "The Cobalt Qube was a computer server appliance product line, meant to be web servers, developed by Cobalt Networks, Inc. (later purchased by Sun Microsystems) from 1998 to 2002 featuring a modified Red Hat Linux operating system and a proprietary Web GUI for server management. The original Qube systems were equipped with MIPS RM5230 (150Mhz, Original Qube) or RM5231 (250Mhz, Qube 2) processors. Both models come with 16MB of RAM (2x8MB SIMM's) and an 8GB or 10GB 3.5..."
wikitext
text/x-wiki
The Cobalt Qube was a computer server appliance product line, meant to be web servers, developed by Cobalt Networks, Inc. (later purchased by Sun Microsystems) from 1998 to 2002 featuring a modified Red Hat Linux operating system and a proprietary Web GUI for server management.
The original Qube systems were equipped with MIPS RM5230 (150Mhz, Original Qube) or RM5231 (250Mhz, Qube 2) processors.
Both models come with 16MB of RAM (2x8MB SIMM's) and an 8GB or 10GB 3.5 inch IDE hard disk as standard.
Gateway also produced re-badged Cobalt Qube 2's which came in black and included a PCI Dial-Up modem. I do not have one of these so I cannot document its functionality or specifications
The original power supply can (and should) be replaced with a 45W USB-C power adapter. Bridging it requires a USB-C to 12V barrel connector and a Barrel to 3-pin DIN (Male) 5.5x 2.1mm cable
There is also a 40mm internal fan that should be replaced. Installing heatsinks on all internal chips is also recommended to prolong the lifespan of the device.
My Cobalt Qube 2 has been significantly modified since I purchased it from a user on eBay in late 2023. Some of the present modifications include
- RAM is maxed out to 256MB
- The original IDE hard disk has been replaced with 120GB SATA SSD using Startech SATA to IDE adapter. Due to the slow disk controller on the Cobalt Qube 2 (4MB/s at best) an SD card may be a more economical replacement
- The "BIOS" (or system bootstrap ROM) has been replaced with the "CoLo" bootloader. The original Cobalt firmware was hard-coded to launch a Linux kernel from an '''ext2 ''(not ext3 or ext4!)''''' partition on /dev/hda1
CoLo additionally allows connection to the unit via the RS232 serial port for system control after power on. The standard 115200,8,1 configuration will allow connection to the unit. Kernels can be downloaded and executed via TFTP via the CoLo interface
At this time the unit is not presently in operation
34756d7be3407bab83a99e47272307e9f9d24b66
7
6
2024-08-31T09:57:08Z
CursedSilicon
1
wikitext
text/x-wiki
The Cobalt Qube was a computer server appliance product line, meant to be web servers, developed by Cobalt Networks, Inc. (later purchased by Sun Microsystems) from 1998 to 2002 featuring a modified Red Hat Linux operating system and a proprietary Web GUI for server management.
The original Qube systems were equipped with MIPS RM5230 (150Mhz, Original Qube) or RM5231 (250Mhz, Qube 2) processors.
Both models come with 16MB of RAM (2x8MB SIMM's) and an 8GB or 10GB 3.5 inch IDE hard disk as standard.
Gateway also produced re-badged Cobalt Qube 2's which came in black and included a PCI Dial-Up modem. I do not have one of these so I cannot document its functionality or specifications
The original power supply can (and should) be replaced with a 45W USB-C power adapter. Bridging it requires a USB-C to 12V barrel connector and a Barrel to 3-pin DIN (Male) 5.5x 2.1mm cable
There is also a 40mm internal fan that should be replaced. Installing heatsinks on all internal chips is also recommended to prolong the lifespan of the device.
My Cobalt Qube 2 has been significantly modified since I purchased it from a user on eBay in late 2023. Some of the present modifications include
* RAM is maxed out to 256MB
* The original IDE hard disk has been replaced with 120GB SATA SSD using Startech SATA to IDE adapter. Due to the slow disk controller on the Cobalt Qube 2 (4MB/s at best) an SD card may be a more economical replacement
* The "BIOS" (or system bootstrap ROM) has been replaced with the "CoLo" bootloader. The original Cobalt firmware was hard-coded to launch a Linux kernel from an '''ext2 ''(not ext3 or ext4!)''''' partition on /dev/hda1
CoLo additionally allows connection to the unit via the RS232 serial port for system control after power on. The standard 115200,8,1 configuration will allow connection to the unit. Kernels can be downloaded and executed via TFTP via the CoLo interface
'''At this time the unit is functional, but not presently in operation'''
6b011fc5e7fd25abaf84252f2bd9c68b074a855b
8
7
2024-08-31T09:59:01Z
CursedSilicon
1
wikitext
text/x-wiki
The Cobalt Qube was the worlds first "Linux Appliance" designed and released by Cobalt Networks (later purchased by Sun Microsystems). Sold from 1998 to 2002 it features a modified Red Hat Linux operating system and a proprietary Web GUI for server management.
The original Qube systems were equipped with MIPS RM5230 (150Mhz, Original Qube) or RM5231 (250Mhz, Qube 2) processors. These CPU's are similar to the RM5000 series in Sun's "Indy" workstations.
Both the Qube 1 and 2 come with 16MB of RAM (2x8MB SIMM's) and an 8GB or 10GB 3.5 inch IDE hard disk as standard.
Gateway also produced re-badged Cobalt Qube 2's which came in black and included a PCI Dial-Up modem. '''I do not have one of these so I cannot document its functionality or specifications'''
The original power supply can (and should) be replaced with a 45W USB-C power adapter. Bridging it requires a USB-C to 12V barrel connector and a Barrel to 3-pin DIN (Male) 5.5x 2.1mm cable
There is also a 40mm internal fan that should be replaced. Installing heatsinks on all internal chips is also recommended to prolong the lifespan of the device.
My Cobalt Qube 2 has been significantly modified since I purchased it from a user on eBay in late 2023. Some of the present modifications include
* RAM is maxed out to 256MB
* The original IDE hard disk has been replaced with 120GB SATA SSD using Startech SATA to IDE adapter. Due to the slow disk controller on the Cobalt Qube 2 (4MB/s at best) an SD card may be a more economical replacement
* The "BIOS" (or system bootstrap ROM) has been replaced with the "CoLo" bootloader. The original Cobalt firmware was hard-coded to launch a Linux kernel from an '''ext2 ''(not ext3 or ext4!)''''' partition on /dev/hda1
CoLo additionally allows connection to the unit via the RS232 serial port for system control after power on. The standard 115200,8,1 configuration will allow connection to the unit. Kernels can be downloaded and executed via TFTP via the CoLo interface
'''At this time the unit is functional, but not presently in operation'''
927f59443872e976049b280a0e5688362dff4a1e
Cobalt Qube 3
0
5
10
2024-08-31T10:06:03Z
CursedSilicon
1
Created page with "The Cobalt Qube 3 was the final Cobalt Qube product, released in 2002. Cobalt Networks (acquired shortly after by Sun Microsystems) discontinued it shortly after to focus on the Cobalt "RaQ" line of 1U server appliances instead The Qube 3 is a large departure from the older Cobalt Qube 2. Moving to an AMD K-6 2 at either 300 or 450Mhz and including a SCSI and USB port on the rear of the unit. The power connector was also re-designed to a 5 pin DIN connector requiri..."
wikitext
text/x-wiki
The Cobalt Qube 3 was the final Cobalt Qube product, released in 2002. Cobalt Networks (acquired shortly after by Sun Microsystems) discontinued it shortly after to focus on the Cobalt "RaQ" line of 1U server appliances instead
The Qube 3 is a large departure from the older Cobalt Qube 2. Moving to an AMD K-6 2 at either 300 or 450Mhz and including a SCSI and USB port on the rear of the unit.
The power connector was also re-designed to a 5 pin DIN connector requiring multiple ATX PC style voltages. Specifically +12V @ 2.0A, -12V @ 0.5A and +5V at 6.0A
'''Cobalt Qube 3's unfortunately suffer from capacitor plague and should be immediately inspected and have all of their capacitors replaced to ensure continued operation'''
'''At this time my Cobalt Qube 3 is non-operational due to lacking a compatible power supply'''
279ecdecab1521f99dd908624aed79bfee9cb3dd
Netra X1
0
6
14
2024-08-31T10:23:07Z
CursedSilicon
1
Created page with "For some terrible reason I picked up a bunch (five) Sun Netra X1's a couple years ago during a visit to Re-PC Unfortunately these machines are '''terrible''' for a multitude of reasons! Unlike their "Netra T1" counterparts the X1's were built to be as cheap as possible. Netra X1's all come with either a 400Mhz or 500Mhz UltraSPARC IIe CPU. 400Mhz models can accept a maximum of 1GB of PC133 RAM, 500Mhz models can accept 2GB All models come equipped with dual 10/100..."
wikitext
text/x-wiki
For some terrible reason I picked up a bunch (five) Sun Netra X1's a couple years ago during a visit to Re-PC
Unfortunately these machines are '''terrible''' for a multitude of reasons!
Unlike their "Netra T1" counterparts the X1's were built to be as cheap as possible.
Netra X1's all come with either a 400Mhz or 500Mhz UltraSPARC IIe CPU.
400Mhz models can accept a maximum of 1GB of PC133 RAM, 500Mhz models can accept 2GB
All models come equipped with dual 10/100 "DEC Tulip" ethernet ports and up to two 40GB IDE hard disks, with proprietary mounts
Like all Sun machines the servers require an RJ45-to-RS232 cable connected in order to access OpenFirmware.
With that out of the way here's some of the many problems you as a Sun Netra X1 owner can expect to encounter
d47b79cae496a59803bce35f9b1d2f7e9526676d
15
14
2024-08-31T10:27:53Z
CursedSilicon
1
wikitext
text/x-wiki
For some terrible reason I picked up a bunch (five) Sun Netra X1's a couple years ago during a visit to Re-PC
Unfortunately these machines are '''terrible''' for a multitude of reasons!
Unlike their "Netra T1" counterparts the X1's were built to be as cheap as possible.
Netra X1's all come with either a 400Mhz or 500Mhz UltraSPARC IIe CPU.
400Mhz models can accept a maximum of 1GB of PC133 RAM, 500Mhz models can accept 2GB
All models come equipped with dual 10/100 "DEC Tulip" ethernet ports and up to two 40GB IDE hard disks, with proprietary mounts
Like all Sun machines the servers require an RJ45-to-RS232 cable connected in order to access OpenFirmware.
== Here's some of the many problems you as a Sun Netra X1 owner can expect to encounter ==
* Bad capacitors! These machines were built to be as cheap as possible. As such the capacitors will probably have already leaked, or are very excited to do so. Make sure you replace them!
* Extremely flaky ALi controller. Sun decided that in order to meet cost they would simply use as many "x86 parts" as possible. The chipset in use is from the notoriously bad ALi and will give you no end of annoying problems
* Large hard disks won't work. Anything over 120GB seems to make the ALi controller just fall over dead
* Memory: You need to find PC133 ECC RAM. Good luck, that stuff is expensive. And the 4 slots are angled in such a way as to make it incredibly annoying to install or remove that RAM!
* The ethernet chips are rated for "10/100 operation", but due to the crappy ALi controller and a lack of DMA, iperf tests seem to cap out at around 2MB/s while pinning the poor CPU at 100% utilization
* Linux support is non-existent! The bad ALi controller seems to reset itself on boot under Linux which causes the IDE hard disks to simply...disappear! Rendering the root filesystem inaccessible
* OpenBSD works but is extremely slow. Your milage may vary
796ffa07a8274f047e624565d1ce822bfdd5bd1d
16
15
2024-08-31T10:30:00Z
CursedSilicon
1
wikitext
text/x-wiki
For some terrible reason I picked up a bunch (five) Sun Netra X1's a couple years ago during a visit to Re-PC
Unfortunately these machines are '''terrible''' for a multitude of reasons!
Unlike their "Netra T1" counterparts the X1's were built to be as cheap as possible.
Netra X1's all come with either a 400Mhz or 500Mhz UltraSPARC IIe CPU.
400Mhz models can accept a maximum of 1GB of PC133 RAM, 500Mhz models can accept 2GB
All models come equipped with dual 10/100 "DEC Tulip" ethernet ports and up to two 40GB IDE hard disks, with proprietary mounts
Like all Sun machines the servers require an RJ45-to-RS232 cable connected in order to access OpenFirmware.
== Here's some of the many problems you as a Sun Netra X1 owner can expect to encounter ==
* Bad capacitors! These machines were built to be as cheap as possible. As such the capacitors will probably have already leaked, or are very excited to do so. Make sure you replace them!
* Extremely flaky ALi controller. Sun decided that in order to meet cost they would simply use as many "x86 parts" as possible. The chipset in use is from the notoriously bad ALi and will give you no end of annoying problems
* Large hard disks won't work. Anything over 120GB seems to make the ALi controller just fall over dead
* Memory: You need to find PC133 ECC RAM. Good luck, that stuff is expensive. And the 4 slots are angled in such a way as to make it incredibly annoying to install or remove that RAM!
* The ethernet chips are rated for "10/100 operation", but due to the crappy ALi controller and a lack of DMA, iperf tests seem to cap out at around 2MB/s while pinning the poor CPU at 100% utilization
* Linux support is non-existent! The bad ALi controller seems to reset itself on boot under Linux which causes the IDE hard disks to simply...disappear! Rendering the root filesystem inaccessible
* OpenBSD works but is extremely slow. Your milage may vary
'''Unsurprisingly with all of the above issues my Netra X1's are not in use, and are unlikely to be used in the foreseeable future'''
2af58ccbf18205a76ae40517310eb34ad42ce6cd
Hyve Zeus
0
7
22
2024-09-01T00:58:09Z
CursedSilicon
1
Created page with "The Hyve "Zeus" is a server made for Facebook before their "Open Compute Project". As a result there's about a bajillion of these things floating around on eBay these days Hyve Zeus units feature a Super Micro X9DRD-iF motherboard with all PCI-E slots except for one removed They are usually equipped with some variation of low-end Intel Xeons with passively cooled heatsinks attached The unit I (unfortunately) upgraded with two top-end Xeon 2697v2's and 128GB of DDR3..."
wikitext
text/x-wiki
The Hyve "Zeus" is a server made for Facebook before their "Open Compute Project". As a result there's about a bajillion of these things floating around on eBay these days
Hyve Zeus units feature a Super Micro X9DRD-iF motherboard with all PCI-E slots except for one removed
They are usually equipped with some variation of low-end Intel Xeons with passively cooled heatsinks attached
The unit I (unfortunately) upgraded with two top-end Xeon 2697v2's and 128GB of DDR3 ECC memory. As a result the unit now contains two 30,000 RPM copper heatsink + fan units from Delta. The resulting noise of this server renders it virtually unusable in areas with people present
'''It is presently part of the infrastructure of my local hackerspace. However we are likely to retire it in future'''
fe168435f4b12fefd3c7e91ffbba22932d123156
Acer EasyStore H340
0
8
24
2024-09-02T10:24:30Z
CursedSilicon
1
Created page with "The Acer EasyStore H340 was a home NAS sold by Acer during the Windows Home Server era. Much like its "cousin" the [[HP MediaSmart EX495]] it came pre-loaded with [[Windows Home Server 2007]] By default this device would come with 4x 1TB SATA 3.5" hard disks installed. The top most drive includes a warning label explaining that the operating system is installed on it and to be careful with removing or replacing the drive. The machine originally shipped with an extremel..."
wikitext
text/x-wiki
The Acer EasyStore H340 was a home NAS sold by Acer during the Windows Home Server era. Much like its "cousin" the [[HP MediaSmart EX495]] it came pre-loaded with [[Windows Home Server 2007]]
By default this device would come with 4x 1TB SATA 3.5" hard disks installed. The top most drive includes a warning label explaining that the operating system is installed on it and to be careful with removing or replacing the drive.
The machine originally shipped with an extremely anemic Intel Atom 230 CPU and 2GB of DDR2 memory as standard to compliment the storage. It also contains a single PCI-E slot for (small!) expansion cards.
Unfortunately my H340 suffered significant damage in shipping as the device was *extremely* poorly packaged. As a result the internals of the machine have been completely replaced.
At this time the machine has an ASUS AT4NM10T ITX motherboard installed. This board features an Atom D525 chip and can support up to 8GB of SODIMM (laptop) memory. This chip is roughly comparable to two Atom 230's "glued" together and is extremely unreliable in operation. Despite having 4 SATA ports, only two ports operate at SATA 3 (6Gbps) speeds, the other two are SATA 2 (3Gbps) ports. Ethernet is handled by an onboard gigabit Realtek chip as standard
During a stream in 2023 I was able to get this machine to run [[Windows Server 2000|'''''Windows Server 2000''''']] successfully. This proved quite stable and extremely performant over the newer Server 2003 R2 x64. This unit may be repurposed in future to run services atop that operating system version.
a6c90b980e983e8227a2a3570ba0ec8e47b2369d
27
24
2024-09-02T10:33:49Z
CursedSilicon
1
wikitext
text/x-wiki
The Acer EasyStore H340 was a home NAS sold by Acer during the Windows Home Server era. Much like its "cousin" the [[HP MediaSmart EX495]] it came pre-loaded with [[Windows Home Server 2007]]
By default this device would come with 4x 1TB SATA 3.5" hard disks installed. The top most drive includes a warning label explaining that the operating system is installed on it and to be careful with removing or replacing the drive.
The machine originally shipped with an extremely anemic Intel Atom 230 CPU and 2GB of DDR2 memory as standard to compliment the storage. It also contains a single PCI-E slot for (small!) expansion cards.
Unfortunately my H340 suffered significant damage in shipping as the device was *extremely* poorly packaged. As a result the internals of the machine have been completely replaced.
At this time the machine has an ASUS AT4NM10T ITX motherboard installed. This board features an Atom D525 chip and can support up to 8GB of SODIMM (laptop) memory. This chip is roughly comparable to two Atom 230's "glued" together and is extremely unreliable in operation. Despite having 4 SATA ports, only two ports operate at SATA 3 (6Gbps) speeds, the other two are SATA 2 (3Gbps) ports. Ethernet is handled by an onboard gigabit Realtek chip as standard
During a stream in 2023 I was able to get this machine to run [[Windows Server 2000|'''''Windows Server 2000''''']] successfully. This proved quite stable and extremely performant over the newer Server 2003 R2 x64. This unit may be repurposed in future to run services atop that operating system version.
[[File:Acer EasyStore Front.jpg|none|thumb|Front view of Acer EasyStore]]
[[File:Rear view of EasyStore.jpg|none|thumb|Rear view of Acer EasyStore H340]]
4efd5f3d8dab243929fb1576ea13ebc4a1215cad
28
27
2024-09-02T10:38:54Z
CursedSilicon
1
wikitext
text/x-wiki
The Acer EasyStore H340 was a home NAS sold by Acer during the Windows Home Server era. Much like its "cousin" the [[HP MediaSmart EX495]] it came pre-loaded with [[Windows Home Server 2007]]
By default this device would come with 4x 1TB SATA 3.5" hard disks installed. The top most drive includes a warning label explaining that the operating system is installed on it and to be careful with removing or replacing the drive.
The machine originally shipped with an extremely anemic Intel Atom 230 CPU and 2GB of DDR2 memory as standard to compliment the storage. It also contains a single PCI-E slot for (small!) expansion cards.
Unfortunately my H340 suffered significant damage in shipping as the device was *extremely* poorly packaged. As a result the internals of the machine have been completely replaced.
At this time the machine has an ASUS AT4NM10T-I ITX motherboard installed. This board features an Atom D525 chip and can support up to 8GB of SODIMM (laptop) memory. This chip is roughly comparable to two Atom 230's "glued" together and is extremely unreliable in operation. Despite having 4 SATA ports, only two ports operate at SATA 3 (6Gbps) speeds, the other two are SATA 2 (3Gbps) ports. Ethernet is handled by an onboard gigabit Realtek chip as standard
During a stream in 2023 I was able to get this machine to run [[Windows Server 2000|'''''Windows Server 2000''''']] successfully. This proved quite stable and extremely performant over the newer Server 2003 R2 x64. This unit may be repurposed in future to run services atop that operating system version.
[[File:Acer EasyStore Front.jpg|none|thumb|Front view of Acer EasyStore]]
[[File:Rear view of EasyStore.jpg|none|thumb|Rear view of Acer EasyStore H340]]
2f737f731884bde15267e2e0f15c8af50005868f
29
28
2024-09-02T10:52:50Z
CursedSilicon
1
wikitext
text/x-wiki
The Acer EasyStore H340 was a home NAS sold by Acer during the Windows Home Server era. Much like its "cousin" the [[HP MediaSmart EX495]] it came pre-loaded with [[Windows Home Server 2007]]
By default this device would come with 4x 1TB SATA 3.5" hard disks installed. The top most drive includes a warning label explaining that the operating system is installed on it and to be careful with removing or replacing the drive.
The machine originally shipped with an extremely anemic Intel Atom 230 CPU and 2GB of DDR2 memory as standard to compliment the storage. It also contains a single PCI-E slot for (small!) expansion cards.
Unfortunately my H340 suffered significant damage in shipping as the device was *extremely* poorly packaged. As a result the internals of the machine have been completely replaced.
At this time the machine has an ASUS AT4NM10T-I ITX motherboard installed. This board features an Atom D525 chip and can support up to 8GB of SODIMM (laptop) memory. This chip is roughly comparable to two Atom 230's "glued" together and is extremely unreliable in operation. Despite having 4 SATA ports, only two ports operate at SATA 3 (6Gbps) speeds, the other two are SATA 2 (3Gbps) ports. Ethernet is handled by an onboard gigabit Realtek chip as standard
During a stream in 2023 I was able to get this machine to run [[Windows Server 2000|'''''Windows Server 2000''''']] successfully. This proved quite stable and extremely performant over the newer Server 2003 R2 x64. This unit may be repurposed in future to run services atop that operating system version.
122d28ff7244516c5fb2b4e11c0525f797515663
30
29
2024-09-02T10:53:34Z
CursedSilicon
1
wikitext
text/x-wiki
The Acer EasyStore H340 was a home NAS sold by Acer during the Windows Home Server era. Much like its "cousin" the [[HP MediaSmart EX495]] it came pre-loaded with [[Windows Home Server 2007]]
By default this device would come with 4x 1TB SATA 3.5" hard disks installed. The top most drive includes a warning label explaining that the operating system is installed on it and to be careful with removing or replacing the drive.
The machine originally shipped with an extremely anemic Intel Atom 230 CPU and 2GB of DDR2 memory as standard to compliment the storage. It also contains a single PCI-E slot for (small!) expansion cards.
Unfortunately my H340 suffered significant damage in shipping as the device was *extremely* poorly packaged. As a result the internals of the machine have been completely replaced.
At this time the machine has an ASUS AT4NM10T-I ITX motherboard installed. This board features an Atom D525 chip and can support up to 8GB of SODIMM (laptop) memory. This chip is roughly comparable to two Atom 230's "glued" together and is extremely unreliable in operation. Despite having 4 SATA ports, only two ports operate at SATA 3 (6Gbps) speeds, the other two are SATA 2 (3Gbps) ports. Ethernet is handled by an onboard gigabit Realtek chip as standard
During a stream in 2023 I was able to get this machine to run [[Windows Server 2000|'''''Windows Server 2000''''']] successfully. This proved quite stable and extremely performant over the newer Server 2003 R2 x64. This unit may be repurposed in future to run services atop that operating system version.
[[File:Acer EasyStore Front.jpg|none|thumb]]
9af3f8f1749361a91a986b3fe7053d7ad415294b
31
30
2024-09-02T10:54:12Z
CursedSilicon
1
wikitext
text/x-wiki
The Acer EasyStore H340 was a home NAS sold by Acer during the Windows Home Server era. Much like its "cousin" the [[HP MediaSmart EX495]] it came pre-loaded with [[Windows Home Server 2007]]
By default this device would come with 4x 1TB SATA 3.5" hard disks installed. The top most drive includes a warning label explaining that the operating system is installed on it and to be careful with removing or replacing the drive.
The machine originally shipped with an extremely anemic Intel Atom 230 CPU and 2GB of DDR2 memory as standard to compliment the storage. It also contains a single PCI-E slot for (small!) expansion cards.
Unfortunately my H340 suffered significant damage in shipping as the device was *extremely* poorly packaged. As a result the internals of the machine have been completely replaced.
At this time the machine has an ASUS AT4NM10T-I ITX motherboard installed. This board features an Atom D525 chip and can support up to 8GB of SODIMM (laptop) memory. This chip is roughly comparable to two Atom 230's "glued" together and is extremely unreliable in operation. Despite having 4 SATA ports, only two ports operate at SATA 3 (6Gbps) speeds, the other two are SATA 2 (3Gbps) ports. Ethernet is handled by an onboard gigabit Realtek chip as standard
During a stream in 2023 I was able to get this machine to run [[Windows Server 2000|'''''Windows Server 2000''''']] successfully. This proved quite stable and extremely performant over the newer Server 2003 R2 x64. This unit may be repurposed in future to run services atop that operating system version.
[[File:Acer EasyStore Front.jpg|none|thumb|Front of unit]]
[[File:Rear view of EasyStore.jpg|none|thumb|Rear of unit]]
f6de9c4a712787a63314c118005a087b62e6c24e
32
31
2024-09-02T11:02:12Z
CursedSilicon
1
wikitext
text/x-wiki
The Acer EasyStore H340 was a home NAS sold by Acer during the Windows Home Server era. Much like its "cousin" the [[HP MediaSmart EX495]] it came pre-loaded with [[Windows Home Server 2007]]
By default this device would come with 4x 1TB SATA 3.5" hard disks installed. The top most drive includes a warning label explaining that the operating system is installed on it and to be careful with removing or replacing the drive.
The machine originally shipped with an extremely anemic Intel Atom 230 CPU and 2GB of DDR2 memory as standard to compliment the storage. It also contains a single PCI-E slot for (small!) expansion cards.
Unfortunately my H340 suffered significant damage in shipping as the device was *extremely* poorly packaged. As a result the internals of the machine have been completely replaced.
At this time the machine has an ASUS AT4NM10T-I ITX motherboard installed. This board features an Atom D525 chip and can support up to 8GB of SODIMM (laptop) memory. This chip is roughly comparable to two Atom 230's "glued" together and is extremely unreliable in operation. Despite having 4 SATA ports, only two ports operate at SATA 3 (6Gbps) speeds, the other two are SATA 2 (3Gbps) ports. Ethernet is handled by an onboard gigabit Realtek chip as standard
During a stream in 2023 I was able to get this machine to run [[Windows Server 2000|'''''Windows Server 2000''''']] successfully. This proved quite stable and extremely performant over the newer Server 2003 R2 x64. This unit may be repurposed in future to run services atop that operating system version.
[[File:Acer EasyStore Front.jpg|none|thumb|Front of unit]]
[[File:Rear view of EasyStore.jpg|none|thumb|Rear of unit]]
9209c58d80aeaed08b7468886fbe70b0b45cd834
File:Acer EasyStore Front.jpg
6
9
25
2024-09-02T10:31:32Z
CursedSilicon
1
wikitext
text/x-wiki
Acer EasyStore H340 (front)
2c455ef655542477f3b337da02b47f7cf2e24458
File:Rear view of EasyStore.jpg
6
10
26
2024-09-02T10:32:25Z
CursedSilicon
1
wikitext
text/x-wiki
Rear view of Acer EasyStore H340
254f9ad2cb0b5a5826d09d98c67d6f8030796844
File:G4 MDD Front.jpg
6
11
33
2024-09-02T11:56:24Z
CursedSilicon
1
wikitext
text/x-wiki
G4 MDD front
addb73a9f46a5cd0448b577d0687aa21eaf669c6
File:G4 MDD 1.42Ghz (rear).jpg
6
12
34
2024-09-02T11:57:34Z
CursedSilicon
1
wikitext
text/x-wiki
G4 MDD 1.42Ghz (rear)
f0739203ecc938d62f68d98f211dd7a8af8bf266
File:G4 MDD 1.25Ghz (rear).jpg
6
13
35
2024-09-02T11:58:38Z
CursedSilicon
1
wikitext
text/x-wiki
G4 MDD 1.25Ghz (rear)
f1e2462758c0a5a90dc83ab557e873d4c0259754
Powermac G4
0
14
36
2024-09-02T11:58:58Z
CursedSilicon
1
Created page with "Apple's PowerMac G4 "MDD" or "Mirrored Drive Door" units are common enough and have been documented heavily enough across the internet by people smarter than me that I don't have much to add about them here. I currently own two units. A Dual 1.42Ghz "Firewire 800" (FW800) model and a Dual 1.25Ghz FW800 model. === 1.42Ghz model details === This machine is outfitted with the maximum 2GB of memory (1.5GB under MacOS 9.2) and the fastest supported GPU, an Nvidia Ti4600..."
wikitext
text/x-wiki
Apple's PowerMac G4 "MDD" or "Mirrored Drive Door" units are common enough and have been documented heavily enough across the internet by people smarter than me that I don't have much to add about them here.
I currently own two units. A Dual 1.42Ghz "Firewire 800" (FW800) model and a Dual 1.25Ghz FW800 model.
=== 1.42Ghz model details ===
This machine is outfitted with the maximum 2GB of memory (1.5GB under MacOS 9.2) and the fastest supported GPU, an Nvidia Ti4600
The 1.42Ghz model is also equipped with a SeriTek/1eVE2+2 expansion card. This card appears(?) to have been discontinued as the SeriTek "Yahoo" store is no longer operational.
The SeriTek card provides a 64-bit PCI-X (266MB/s) interface for attaching two SATA II hard disks. The PCI-X bandwidth allows attached drives to operate near their theoretical maximum of 300MB/s (SATA II 3Gbps) however in operation due to the old, slow G4 CPU typical data transfer rates are roughly half that. This is still considerably faster than the ATA-66 IDE bus installed on the motherboard as standard.
The SeriTek card also contains an OpenFirmware compatible Boot ROM, allowing the card to be used to boot OS 9 natively. The additional I/O performance massively improves I/O bound workloads such as "StuffIt" and heavier apps such as ClassZilla.
The internals of the 1.42Ghz model have also been modified. The power supply has been replaced with a PicoPSU style unit for ATX PC's (with corresponding adapter cable) along with dual Noctua 40mm fans for additional cooling. The main CPU fan has been replaced with a 120mm Noctua "PPC" Industrial fan. This fan outputs considerably more airflow than the original fan, while maintaining comparable noise levels. The CPU has yet to be measured above 35C while in operation under this configuration.
At this time the machine currently operates with MacOS 9.2 and OS X 10.5.9 "Sorbet Leopard" from a 240GB SSD partitioned 50/50 between the two operating systems
The second port was originally configured with a second 120GB drive for PPC Linux. However the "nouveau" Linux driver causes system lockups due to (known) endianness issues on PowerPC platforms
==== 1.25Ghz model details ====
This machine is currently unused and lacks a graphics card. It was purchased for testing upgrading the [[Xserve G4]] with a faster dual processor CPU however this was unsuccessful.
The unit has a SCSI card of currently known vendor as well as a dual gigabit PCI-X SFP NIC of unknown vendor
[[File:G4 MDD Front.jpg|none|thumb|G4 MDD front]]
[[File:G4 MDD 1.42Ghz (rear).jpg|none|thumb|G4 MDD 1.42Ghz (rear)]]
[[File:G4 MDD 1.25Ghz (rear).jpg|none|thumb|G4 MDD 1.25Ghz (rear)]]
b7cab4434a989edf7469633567ac827030d43a9a
37
36
2024-09-02T11:59:27Z
CursedSilicon
1
wikitext
text/x-wiki
Apple's PowerMac G4 "MDD" or "Mirrored Drive Door" units are common enough and have been documented heavily enough across the internet by people smarter than me that I don't have much to add about them here.
I currently own two units. A Dual 1.42Ghz "Firewire 800" (FW800) model and a Dual 1.25Ghz FW800 model.
== 1.42Ghz model details ==
This machine is outfitted with the maximum 2GB of memory (1.5GB under MacOS 9.2) and the fastest supported GPU, an Nvidia Ti4600
The 1.42Ghz model is also equipped with a SeriTek/1eVE2+2 expansion card. This card appears(?) to have been discontinued as the SeriTek "Yahoo" store is no longer operational.
The SeriTek card provides a 64-bit PCI-X (266MB/s) interface for attaching two SATA II hard disks. The PCI-X bandwidth allows attached drives to operate near their theoretical maximum of 300MB/s (SATA II 3Gbps) however in operation due to the old, slow G4 CPU typical data transfer rates are roughly half that. This is still considerably faster than the ATA-66 IDE bus installed on the motherboard as standard.
The SeriTek card also contains an OpenFirmware compatible Boot ROM, allowing the card to be used to boot OS 9 natively. The additional I/O performance massively improves I/O bound workloads such as "StuffIt" and heavier apps such as ClassZilla.
The internals of the 1.42Ghz model have also been modified. The power supply has been replaced with a PicoPSU style unit for ATX PC's (with corresponding adapter cable) along with dual Noctua 40mm fans for additional cooling. The main CPU fan has been replaced with a 120mm Noctua "PPC" Industrial fan. This fan outputs considerably more airflow than the original fan, while maintaining comparable noise levels. The CPU has yet to be measured above 35C while in operation under this configuration.
At this time the machine currently operates with MacOS 9.2 and OS X 10.5.9 "Sorbet Leopard" from a 240GB SSD partitioned 50/50 between the two operating systems
The second port was originally configured with a second 120GB drive for PPC Linux. However the "nouveau" Linux driver causes system lockups due to (known) endianness issues on PowerPC platforms
== 1.25Ghz model details ==
This machine is currently unused and lacks a graphics card. It was purchased for testing upgrading the [[Xserve G4]] with a faster dual processor CPU however this was unsuccessful.
The unit has a SCSI card of currently known vendor as well as a dual gigabit PCI-X SFP NIC of unknown vendor
[[File:G4 MDD Front.jpg|none|thumb|G4 MDD front]]
[[File:G4 MDD 1.42Ghz (rear).jpg|none|thumb|G4 MDD 1.42Ghz (rear)]]
[[File:G4 MDD 1.25Ghz (rear).jpg|none|thumb|G4 MDD 1.25Ghz (rear)]]
352aa11b8740c570e33d1025a096e565af087b84
38
37
2024-09-02T11:59:51Z
CursedSilicon
1
wikitext
text/x-wiki
Apple's PowerMac G4 "MDD" or "Mirrored Drive Door" units are common enough and have been documented heavily enough across the internet by people smarter than me that I don't have much to add about them here.
I currently own two units. A Dual 1.42Ghz "Firewire 800" (FW800) model and a Dual 1.25Ghz FW800 model.
== 1.42Ghz model details ==
This machine is outfitted with the maximum 2GB of memory (1.5GB under MacOS 9.2) and the fastest supported GPU, an Nvidia Ti4600
The 1.42Ghz model is also equipped with a SeriTek/1eVE2+2 expansion card. This card appears(?) to have been discontinued as the SeriTek "Yahoo" store is no longer operational.
The SeriTek card provides a 64-bit PCI-X (266MB/s) interface for attaching two SATA II hard disks. The PCI-X bandwidth allows attached drives to operate near their theoretical maximum of 300MB/s (SATA II 3Gbps) however in operation due to the old, slow G4 CPU typical data transfer rates are roughly half that. This is still considerably faster than the ATA-66 IDE bus installed on the motherboard as standard.
The SeriTek card also contains an OpenFirmware compatible Boot ROM, allowing the card to be used to boot OS 9 natively. The additional I/O performance massively improves I/O bound workloads such as "StuffIt" and heavier apps such as ClassZilla.
The internals of the 1.42Ghz model have also been modified. The power supply has been replaced with a PicoPSU style unit for ATX PC's (with corresponding adapter cable) along with dual Noctua 40mm fans for additional cooling. The main CPU fan has been replaced with a 120mm Noctua "PPC" Industrial fan. This fan outputs considerably more airflow than the original fan, while maintaining comparable noise levels. The CPU has yet to be measured above 35C while in operation under this configuration.
At this time the machine currently operates with MacOS 9.2 and OS X 10.5.9 "Sorbet Leopard" from a 240GB SSD partitioned 50/50 between the two operating systems
The second port was originally configured with a second 120GB drive for PPC Linux. However the "nouveau" Linux driver causes system lockups due to (known) endianness issues on PowerPC platforms
== 1.25Ghz model details ==
This machine is currently unused and lacks a graphics card. It was purchased for testing upgrading the [[Xserve G4]] with a faster dual processor CPU however this was unsuccessful.
The unit has a SCSI card of currently known vendor as well as a dual gigabit PCI-X SFP NIC of unknown vendor
== Images ==
[[File:G4 MDD Front.jpg|none|thumb|G4 MDD front]]
[[File:G4 MDD 1.42Ghz (rear).jpg|none|thumb|G4 MDD 1.42Ghz (rear)]]
[[File:G4 MDD 1.25Ghz (rear).jpg|none|thumb|G4 MDD 1.25Ghz (rear)]]
4f3a1a8aa25fd5b14119450cb16c9b8dfc7441aa
File:Mac G5 Quad (front).jpg
6
15
39
2024-09-07T07:49:24Z
CursedSilicon
1
wikitext
text/x-wiki
Mac G5 Quad (front)
649a9a702544b3f985ba633120a6c77d52b37f46
File:Mac G5 Quad (rear).jpg
6
16
40
2024-09-07T07:50:08Z
CursedSilicon
1
wikitext
text/x-wiki
Mac G5 Quad (rear)
bb08d9f3fbedbd6295ac5313dba64ba38cd1942d
Powermac G5
0
17
41
2024-09-07T07:50:36Z
CursedSilicon
1
Created page with "Apple's G5 Powermac's are rather infamous, being Apple's "last gasp" of PowerPC. The PowerMac G5 '''''Quad''''' in particular is easily among Apple's most unloved and slapdash engineered products. Due to me taking the suggestion of a friend far too literally (ilu Ben please don't hate me) I own '''''seven''''' G5 Quads '''Despite this only one of them is functional!''' All Mac G5 Quads were made with "water cooling" loops, due to the thermal output of the CPU's at..."
wikitext
text/x-wiki
Apple's G5 Powermac's are rather infamous, being Apple's "last gasp" of PowerPC. The PowerMac G5 '''''Quad''''' in particular is easily among Apple's most unloved and slapdash engineered products.
Due to me taking the suggestion of a friend far too literally (ilu Ben please don't hate me) I own '''''seven''''' G5 Quads
'''Despite this only one of them is functional!'''
All Mac G5 Quads were made with "water cooling" loops, due to the thermal output of the CPU's at the time. (105 watts of heat in 2005 is a lot, though with what Intel puts out these days seems rather pedestrian!) '''''however calling it water cooling is incorrect.''''' It's actually radiator fluid! Specifically "Dex-Cool" or AntiFreeze.
The water cooling loops were designed and manufactured by American car maker GM Auto's engine radiator subsidiary. Your G5 Mac literally uses car parts to cool its CPU's! It's any wonder Apple ditched IBM.
It's possible (and desirable) to replace the entire cooling assembly, the 68KMLA forms calls it the "New Blood Mod" though I have not yet performed the repairs on my units due to cost.
Anyway. The one singular G5 Quad I have working is effectively a maxed out G5 Quad. The specifications are listed below
4x 2.5Ghz PPC64 G5 CPU's (2c/2t)
16GB DDR2-667 (or 800? I forget the max speed) RAM. In theory the chipset can support 32GB but nobody has managed to get one operating with that much memory.
Two 240GB SATA SSD's. '''Due to Apple's flaky SATA controller most drives won't work as negotiating SATA 3 speeds down to SATA 1 causes the controller to instead hang. You may want to find drives that have a SATA1 jumper option to prevent this!'''
As the G5 Quad contains four PCI-E slots (of varying bandwidths) I've arranged them as follows
240GB NVME drive via PCI-E adapter (PCI-E x4)
10G Intel X520 SFP ethernet adapter (PCI-E x8)
Slot blocked by dual-slot GPU (PCI-E x8 otherwise)
ATI Radeon X1950 (vBIOS flashed for Mac operation)
The NVME drive is purely used for Linux. GRUB will load a kernel from the SATA drive and is configured to pass root=/dev/nvme0n1p1 allowing the root filesystem to be run off NVME. As a bonus, moving the Mac "k2_sata" kernel module to be loaded on-demand instead of at boot will save 5 seconds off the Linux kernel boot time.
The system currently dual boots OS X 10.5.9 "Sorbet" Leopard and Gentoo PPC64
Unfortunately G5 Quads cannot run Tiger due to missing fan control drivers. If installed, the fans will eventually ramp to 100% as a failsafe mechanism.
[[File:Mac G5 Quad (front).jpg|alt=Mac G5 Quad (front)|none|thumb|Mac G5 Quad (front)]]
[[File:Mac G5 Quad (rear).jpg|alt=Mac G5 Quad (rear)|none|thumb|Mac G5 Quad (rear)]]
f568431ec7d33c042c4f6273a952b50c41b96cff
42
41
2024-09-07T08:05:58Z
CursedSilicon
1
wikitext
text/x-wiki
Apple's G5 Powermac's are rather infamous, being Apple's "last gasp" of PowerPC. The PowerMac G5 '''''Quad''''' in particular is easily among Apple's most unloved and slapdash engineered products.
Due to me taking the suggestion of a friend far too literally (ilu Ben please don't hate me) I own '''''seven''''' G5 Quads
'''Despite this only one of them is functional!'''
All Mac G5 Quads were made with "water cooling" loops, due to the thermal output of the CPU's at the time. (105 watts of heat in 2005 is a lot, though with what Intel puts out these days seems rather pedestrian!) '''''however calling it water cooling is incorrect.''''' It's actually radiator fluid! Specifically "Dex-Cool" or AntiFreeze.
The water cooling loops were designed and manufactured by American car maker GM Auto's engine radiator subsidiary. Your G5 Mac literally uses car parts to cool its CPU's! It's any wonder Apple ditched IBM.
It's possible (and desirable) to replace the entire cooling assembly, the 68KMLA forms calls it the "New Blood Mod" though I have not yet performed the repairs on my units due to cost.
Anyway. The one singular G5 Quad I have working is effectively a maxed out G5 Quad. The specifications are listed below
4x 2.5Ghz PPC64 G5 CPU's (2c/2t)
16GB DDR2-667 (or 800? I forget the max speed) RAM. In theory the chipset can support 32GB but nobody has managed to get one operating with that much memory.
Two 240GB SATA SSD's. '''Due to Apple's flaky SATA controller most drives won't work as negotiating SATA 3 speeds down to SATA 1 causes the controller to instead hang. You may want to find drives that have a SATA1 jumper option to prevent this!'''
As the G5 Quad contains four PCI-E slots (of varying bandwidths) I've arranged them as follows
240GB NVME drive via PCI-E adapter (PCI-E x4)
10G Intel X520 SFP ethernet adapter (PCI-E x8)
Slot blocked by dual-slot GPU (PCI-E x8 otherwise)
ATI Radeon X1950 (vBIOS flashed for Mac operation)
The NVME drive is purely used for Linux. GRUB will load a kernel from the SATA drive and is configured to pass root=/dev/nvme0n1p1 allowing the root filesystem to be run off NVME. As a bonus, moving the Mac "k2_sata" kernel module to be loaded on-demand instead of at boot will save 5 seconds off the Linux kernel boot time.
The system currently dual boots OS X 10.5.9 "Sorbet" Leopard and Gentoo PPC64
Unfortunately G5 Quads cannot run Tiger due to missing fan control drivers. If installed, the fans will eventually ramp to 100% as a failsafe mechanism.
90f31819c66b06a705421475ce5eafa441e3ad17
43
42
2024-09-07T08:06:26Z
CursedSilicon
1
wikitext
text/x-wiki
Apple's G5 Powermac's are rather infamous, being Apple's "last gasp" of PowerPC. The PowerMac G5 '''''Quad''''' in particular is easily among Apple's most unloved and slapdash engineered products.
Due to me taking the suggestion of a friend far too literally (ilu Ben please don't hate me) I own '''''seven''''' G5 Quads
'''Despite this only one of them is functional!'''
All Mac G5 Quads were made with "water cooling" loops, due to the thermal output of the CPU's at the time. (105 watts of heat in 2005 is a lot, though with what Intel puts out these days seems rather pedestrian!) '''''however calling it water cooling is incorrect.''''' It's actually radiator fluid! Specifically "Dex-Cool" or AntiFreeze.
The water cooling loops were designed and manufactured by American car maker GM Auto's engine radiator subsidiary. Your G5 Mac literally uses car parts to cool its CPU's! It's any wonder Apple ditched IBM.
It's possible (and desirable) to replace the entire cooling assembly, the 68KMLA forms calls it the "New Blood Mod" though I have not yet performed the repairs on my units due to cost.
Anyway. The one singular G5 Quad I have working is effectively a maxed out G5 Quad. The specifications are listed below
4x 2.5Ghz PPC64 G5 CPU's (2c/2t)
16GB DDR2-667 (or 800? I forget the max speed) RAM. In theory the chipset can support 32GB but nobody has managed to get one operating with that much memory.
Two 240GB SATA SSD's. '''Due to Apple's flaky SATA controller most drives won't work as negotiating SATA 3 speeds down to SATA 1 causes the controller to instead hang. You may want to find drives that have a SATA1 jumper option to prevent this!'''
As the G5 Quad contains four PCI-E slots (of varying bandwidths) I've arranged them as follows
240GB NVME drive via PCI-E adapter (PCI-E x4)
10G Intel X520 SFP ethernet adapter (PCI-E x8)
Slot blocked by dual-slot GPU (PCI-E x8 otherwise)
ATI Radeon X1950 (vBIOS flashed for Mac operation)
The NVME drive is purely used for Linux. GRUB will load a kernel from the SATA drive and is configured to pass root=/dev/nvme0n1p1 allowing the root filesystem to be run off NVME. As a bonus, moving the Mac "k2_sata" kernel module to be loaded on-demand instead of at boot will save 5 seconds off the Linux kernel boot time.
The system currently dual boots OS X 10.5.9 "Sorbet" Leopard and Gentoo PPC64
Unfortunately G5 Quads cannot run Tiger due to missing fan control drivers. If installed, the fans will eventually ramp to 100% as a failsafe mechanism.
[[File:Mac G5 Quad (front).jpg|thumb|G5 Quad (Front)]]
549c4fdecd6b86737857d9e69c00bb7190cf3afb
44
43
2024-09-07T08:07:08Z
CursedSilicon
1
wikitext
text/x-wiki
Apple's G5 Powermac's are rather infamous, being Apple's "last gasp" of PowerPC. The PowerMac G5 '''''Quad''''' in particular is easily among Apple's most unloved and slapdash engineered products.
Due to me taking the suggestion of a friend far too literally (ilu Ben please don't hate me) I own '''''seven''''' G5 Quads
'''Despite this only one of them is functional!'''
All Mac G5 Quads were made with "water cooling" loops, due to the thermal output of the CPU's at the time. (105 watts of heat in 2005 is a lot, though with what Intel puts out these days seems rather pedestrian!) '''''however calling it water cooling is incorrect.''''' It's actually radiator fluid! Specifically "Dex-Cool" or AntiFreeze.
The water cooling loops were designed and manufactured by American car maker GM Auto's engine radiator subsidiary. Your G5 Mac literally uses car parts to cool its CPU's! It's any wonder Apple ditched IBM.
It's possible (and desirable) to replace the entire cooling assembly, the 68KMLA forms calls it the "New Blood Mod" though I have not yet performed the repairs on my units due to cost.
Anyway. The one singular G5 Quad I have working is effectively a maxed out G5 Quad. The specifications are listed below
4x 2.5Ghz PPC64 G5 CPU's (2c/2t)
16GB DDR2-667 (or 800? I forget the max speed) RAM. In theory the chipset can support 32GB but nobody has managed to get one operating with that much memory.
Two 240GB SATA SSD's. '''Due to Apple's flaky SATA controller most drives won't work as negotiating SATA 3 speeds down to SATA 1 causes the controller to instead hang. You may want to find drives that have a SATA1 jumper option to prevent this!'''
As the G5 Quad contains four PCI-E slots (of varying bandwidths) I've arranged them as follows
240GB NVME drive via PCI-E adapter (PCI-E x4)
10G Intel X520 SFP ethernet adapter (PCI-E x8)
Slot blocked by dual-slot GPU (PCI-E x8 otherwise)
ATI Radeon X1950 (vBIOS flashed for Mac operation)
The NVME drive is purely used for Linux. GRUB will load a kernel from the SATA drive and is configured to pass root=/dev/nvme0n1p1 allowing the root filesystem to be run off NVME. As a bonus, moving the Mac "k2_sata" kernel module to be loaded on-demand instead of at boot will save 5 seconds off the Linux kernel boot time.
The system currently dual boots OS X 10.5.9 "Sorbet" Leopard and Gentoo PPC64
Unfortunately G5 Quads cannot run Tiger due to missing fan control drivers. If installed, the fans will eventually ramp to 100% as a failsafe mechanism.
[[File:Mac G5 Quad (front).jpg|thumb|G5 Quad (Front)|none]]
[[File:Mac G5 Quad (rear).jpg|alt=G5 Quad (Rear)|none|thumb|G5 Quad (Rear)]]
8f54353e6556917df1481f66aaee09619187c270
File:Xserve G4 (Front).jpg
6
19
46
2024-09-07T08:19:34Z
CursedSilicon
1
wikitext
text/x-wiki
Xserve G4 (Front)
0b445a4c62dc025b48d842937288a600124478ad
Xserve G4
0
20
47
2024-09-07T08:20:14Z
CursedSilicon
1
Created page with "So, eBay has a "Make Offer" function that buyers and sellers can use for items on the site. When you submit an offer, the seller has 24 hours to respond. Turns out, if the auction has less than 24 hours remaining '''''and zero bids''''' eBay will auto-accept the "Best Offer" instead. So that's how I got a G4 Xserve for $50 (the seller wanted like $300) The Xserve G4 I have is the [https://everymac.com/systems/apple/xserve/specs/xserve_g4_1ghz.html absolute base..."
wikitext
text/x-wiki
So, eBay has a "Make Offer" function that buyers and sellers can use for items on the site.
When you submit an offer, the seller has 24 hours to respond.
Turns out, if the auction has less than 24 hours remaining '''''and zero bids''''' eBay will auto-accept the "Best Offer" instead.
So that's how I got a G4 Xserve for $50 (the seller wanted like $300)
The Xserve G4 I have is the [https://everymac.com/systems/apple/xserve/specs/xserve_g4_1ghz.html absolute base specification 1.0Ghz single processor unit] however the RAM has been upgraded to the maximum 2GB allowed. I had previously attempted upgrading it with a 1.25Ghz dual processor card from a G4 MDD "donor" system but the machine failed to POST (Chime?) and was downgraded back to stock.
The only other modification was installing all four IDE disk bays and configuring them with StarTech SATA adapters for future use.
'''Due to the significantly more performant G5 Xserve (and the G5 Quad PowerMac) there currently are not any plans to bring this machine into service'''
also I forgot to take a shot of the rear of the unit. However with no expansion cards installed there's nothing of interest on it compared to a stock unit
[[File:Xserve G4 (Front).jpg|none|thumb|Xserve G4 (Front)]]
9de379fda4de7a7d981ef1053d8ae1a4ac2ef1fd
File:Xserve G5 (Front).jpg
6
21
48
2024-09-07T08:35:42Z
CursedSilicon
1
wikitext
text/x-wiki
Xserve G5 (Front)
0fcab9a7f7209e3e27ab0c8fef4743d846e513f6
File:Xserve G5 (Rear).jpg
6
22
49
2024-09-07T08:36:57Z
CursedSilicon
1
wikitext
text/x-wiki
Xserve G5 (Rear)
bfa46a80cd024a448d0fcdf3c3fc2cd8a862a674
Xserve G5
0
23
50
2024-09-07T08:37:54Z
CursedSilicon
1
Created page with "Unlike it's little brother the [[Xserve G4]] the Xserve G5 is a significant step up in capability and usefulness. The unit I own is the fastest Xserve G5 model sold. The 2.3Ghz "Dual Processor" G5. Unlike its "cheese grater sibling" the [[Powermac G5|G5 Quad]] the DP Xserve is based on the older G5 lineage, featuring '''''PCI-X''''' rather than PCI-E slots. This significantly reduces its expandability as 64-bit PCI-X slots are limited to approximately 266MB/s of ban..."
wikitext
text/x-wiki
Unlike it's little brother the [[Xserve G4]] the Xserve G5 is a significant step up in capability and usefulness.
The unit I own is the fastest Xserve G5 model sold. The 2.3Ghz "Dual Processor" G5.
Unlike its "cheese grater sibling" the [[Powermac G5|G5 Quad]] the DP Xserve is based on the older G5 lineage, featuring '''''PCI-X''''' rather than PCI-E slots. This significantly reduces its expandability as 64-bit PCI-X slots are limited to approximately 266MB/s of bandwidth, versus the 4GB/s of a PCI-E 1.0 16x slot in the G5 Quad.
This limitation means we're stuck with only gigabit ethernet rather than the 10G of the Quad. We also only get two PCI-X slots in total instead of three. Of which at least one requires a video card to be installed to operate the unit (unless remote administration tools are installed)
Another limitation (correction?) despite what EveryMac claims, the unit is not capable of 16GB of memory. Only 8GB can be installed (I learned this the hard way!)
'''At present the G5 is paired with a 120GB SATA disk with OS X 10.5.9 "Sorbet" Leopard. However at time of writing the machine is currently unused, pending decisions about what tasks to run on it'''
[[File:Xserve G5 (Front).jpg|alt=Xserve G5 (Front)|none|thumb|Xserve G5 (Front)]]
[[File:Xserve G5 (Rear).jpg|alt=Xserve G5 (Rear)|none|thumb|Xserve G5 (Rear)]]
b69e6f278225f93a33c683c081c1ee22e668c4dd
File:Cobalt RaQ4 (Front).jpg
6
24
51
2024-09-07T08:59:32Z
CursedSilicon
1
wikitext
text/x-wiki
Cobalt RaQ4 (Front)
e5a69bd618870fe740364f6afd93d1b2ab1053c6
File:Cobalt RaQ4 (Rear).jpg
6
25
52
2024-09-07T09:00:25Z
CursedSilicon
1
wikitext
text/x-wiki
Cobalt RaQ4 (Rear)
ffbba25e7bb860132bc8720d1149611b0415d681
Cobalt RaQ
0
26
53
2024-09-07T09:00:58Z
CursedSilicon
1
Created page with "There's not a lot of super useful information to add about specifically the Cobalt RaQ units that isn't already covered by the [[Cobalt Qube 3|Qube 3]]. The RaQ 3/4 are effectively Qube 3's in a 1U server formfactor. Arguably due to the removal of the PCI slot and single IDE port they're '''''worse''''' than the Qube 3 in terms of overall functionality. The power supply is also custom and may also be prone to capacitor leakage similar to the Qube 3 itself. If you wo..."
wikitext
text/x-wiki
There's not a lot of super useful information to add about specifically the Cobalt RaQ units that isn't already covered by the [[Cobalt Qube 3|Qube 3]]. The RaQ 3/4 are effectively Qube 3's in a 1U server formfactor.
Arguably due to the removal of the PCI slot and single IDE port they're '''''worse''''' than the Qube 3 in terms of overall functionality. The power supply is also custom and may also be prone to capacitor leakage similar to the Qube 3 itself.
If you would like to a PCI slot can be soldered back on to the Qube 3, along with the hardware for the second IDE port and other rear I/O ports.
'''Currently the RaQ4 is unused and is unlikely to be used in the future due to its limited hardware functionality'''
[[File:Cobalt RaQ4 (Front).jpg|alt=Cobalt RaQ4 (Front)|none|thumb|Cobalt RaQ4 (Front)]]
[[File:Cobalt RaQ4 (Rear).jpg|alt=Cobalt RaQ4 (Rear)|none|thumb|Cobalt RaQ4 (Rear)]]
86648657c8ec5a12ace6c5927736ebc5cf8427d5
File:PowerEdge 2500 (motherboard).jpg
6
27
54
2024-09-07T09:07:39Z
CursedSilicon
1
wikitext
text/x-wiki
PowerEdge 2500 (motherboard)
808e60f800dadb742f8ae90dfaf8a3d2c4e3da0b
File:PowerEdge 2500 (RAM stick).jpg
6
28
55
2024-09-07T09:08:24Z
CursedSilicon
1
wikitext
text/x-wiki
PowerEdge 2500 (RAM stick)
6ff8b346a69f6f61af0522f554c7476f6d25178e
File:PowerEdge 2500 (rear).jpg
6
29
56
2024-09-07T09:08:59Z
CursedSilicon
1
wikitext
text/x-wiki
PowerEdge 2500 (rear)
6044bfdd2c5ae872c48cbf15736fedecc03f6991
PowerEdge 2500
0
30
57
2024-09-07T09:09:13Z
CursedSilicon
1
Created page with "A $50 Re-PC sale in 2022. Unfortunately this unit was sold claiming to contain dual Pentium 3's, it is only outfitted with a single CPU. At this time I have little documentation on this unit presently as I opened it to simply verify the state of its capacitors before realizing that it was only equipped with a single CPU Once I get an extra VRM for the unit and upgrade the processors I will likely look into what functionality the server can be used for File:Power..."
wikitext
text/x-wiki
A $50 Re-PC sale in 2022. Unfortunately this unit was sold claiming to contain dual Pentium 3's, it is only outfitted with a single CPU.
At this time I have little documentation on this unit presently as I opened it to simply verify the state of its capacitors before realizing that it was only equipped with a single CPU
Once I get an extra VRM for the unit and upgrade the processors I will likely look into what functionality the server can be used for
[[File:PowerEdge 2500 (motherboard).jpg|alt=PowerEdge 2500 (motherboard)|none|thumb|PowerEdge 2500 (motherboard)]]
[[File:PowerEdge 2500 (RAM stick).jpg|alt=PowerEdge 2500 (RAM stick)|none|thumb|PowerEdge 2500 (RAM stick)]]
[[File:PowerEdge 2500 (rear).jpg|alt=PowerEdge 2500 (rear)|none|thumb|PowerEdge 2500 (rear)]]
36d82580c0864cc73fe770610b11265492a6bd0e
DEC AlphaServer 2100
0
31
58
2024-09-10T06:36:51Z
CursedSilicon
1
Created page with "Thanks to a member of the Seattle Retro Computing Society I have a DEC Alpha 2100/275 I don't really know much *about* this machine yet. I'm told it did work by the guy who sold it to me. Conveniently he also furnished me with almost enough spare parts to build a whole second machine '''At this time the machine is currently *unused* because it weighs 200 pounds and needs to be re-assembled and brought into service'''"
wikitext
text/x-wiki
Thanks to a member of the Seattle Retro Computing Society I have a DEC Alpha 2100/275
I don't really know much *about* this machine yet. I'm told it did work by the guy who sold it to me. Conveniently he also furnished me with almost enough spare parts to build a whole second machine
'''At this time the machine is currently *unused* because it weighs 200 pounds and needs to be re-assembled and brought into service'''
cf818a6e9271b6ebfeadc8b710be6159e399a842
File:HP EX495 (Front).jpg
6
32
59
2024-09-10T06:48:14Z
CursedSilicon
1
wikitext
text/x-wiki
HP EX495 (Front)
e6b8d7fc1b670442ed1a77770befa90d791f3290
File:HP EX495 (Rear).jpg
6
33
60
2024-09-10T06:48:42Z
CursedSilicon
1
wikitext
text/x-wiki
HP EX495 (Rear)
eaccfde2eb08eb9f018cdaffa65d0209c36eed2b
HP MediaSmart EX495
0
34
61
2024-09-10T06:48:51Z
CursedSilicon
1
Created page with "Microsoft's first (and so far, only) attempt to break into the then much smaller "home NAS" market. (Ironically Synology was founded in the year 2000 by an ex-Microsoft employee) The EX495 and its brother?...cousin? whatever. The [[Acer EasyStore H340|Acer EasyStore]] (along with several other devices that I don't own) were a fleet of home NAS appliances sold by large OEM's for consumers. The main selling point (I guess?) was the inclusion of "Windows Home Server"...."
wikitext
text/x-wiki
Microsoft's first (and so far, only) attempt to break into the then much smaller "home NAS" market. (Ironically Synology was founded in the year 2000 by an ex-Microsoft employee)
The EX495 and its brother?...cousin? whatever. The [[Acer EasyStore H340|Acer EasyStore]] (along with several other devices that I don't own) were a fleet of home NAS appliances sold by large OEM's for consumers.
The main selling point (I guess?) was the inclusion of "Windows Home Server". A re-skin of Windows Small Business Server 2003 with a web UI and some PC administration software attached. Unsurprisingly both of these features are long-defunct now
The HP is significantly more capable than its Acer counterpart. Its stock configuration can be modified with a larger PSU, additional RAM can be installed and the '''''miserable''''' stock [https://ark.intel.com/content/www/us/en/ark/products/29734/intel-celeron-processor-420-512k-cache-1-60-ghz-800-mhz-fsb.html Celeron 420 CPU] can be replaced with a much more capable Core 2 Quad '''Q9550s''' (the S is important as it needs to be low power!) or an equivalent Xeon if you prefer.
To that end the unit I own (pictured below) is currently outfitted with all of the described upgrades. I have also replaced the rear case fans with 92mm Noctua fans for extra quietness
'''At this time the unit is not currently in active use as I do not have 3.5" hard disks to install into it. Due to the age of the system it also does not support 2TB+ (GPT formatted) disks without swapping the OS for Linux or similar'''
[[File:HP EX495 (Front).jpg|alt=HP EX495 (Front)|none|thumb|HP EX495 (Front)]]
[[File:HP EX495 (Rear).jpg|alt=HP EX495 (Rear)|none|thumb|HP EX495 (Rear)]]
6cd2f93ca7f50c1185fec04fd2f39a373466454b
File:HP KAYAK (Front).jpg
6
35
62
2024-09-10T06:52:18Z
CursedSilicon
1
wikitext
text/x-wiki
HP KAYAK (Front)
631097990f9b473cd945aaae1d02975ff570c89c
File:HP KAYAK (Rear).jpg
6
36
63
2024-09-10T06:53:18Z
CursedSilicon
1
wikitext
text/x-wiki
HP KAYAK (Rear)
96eba51d7c2f212ab95ebe2fdad47a3549c6bb8b
SGI Octane
0
38
65
2024-09-10T06:54:15Z
CursedSilicon
1
Created page with "Technically not *my* machine, this computer is on "indefinite" loan from a member of the local hackerspace pending repair and restoration to working order At this time I do not have any additional information to add about it"
wikitext
text/x-wiki
Technically not *my* machine, this computer is on "indefinite" loan from a member of the local hackerspace pending repair and restoration to working order
At this time I do not have any additional information to add about it
28b5429e5285c50866d79e424531e4a560dd9f83
File:SGI 320 (front).jpg
6
39
66
2024-09-10T07:10:43Z
CursedSilicon
1
wikitext
text/x-wiki
SGI 320 (front)
8fdf34509d6727e3086ede54b7573432136b0607
File:SGI 320 (rear).jpg
6
40
67
2024-09-10T07:11:01Z
CursedSilicon
1
wikitext
text/x-wiki
SGI 320 (rear)
7862b0a87a2f2cd79c7056119777bff5ae00a217
SGI Visual Workstation 320
0
41
68
2024-09-10T07:11:10Z
CursedSilicon
1
Created page with "SGI's...frankly bizarre attempt to break into the x86 workstation world. The Visual Workstation series are seemingly more fondly remembered for their weird quirks and sheer limitations than any usefulness they brought to the market. The SGI Visual Workstation (both 320 and 540) models are '''''NOT''''' PC's. They run x86 processors but everything surrounding them is completely custom * Instead of a BIOS they use the "ARC" Firmware loader * Most of the system is chain..."
wikitext
text/x-wiki
SGI's...frankly bizarre attempt to break into the x86 workstation world. The Visual Workstation series are seemingly more fondly remembered for their weird quirks and sheer limitations than any usefulness they brought to the market.
The SGI Visual Workstation (both 320 and 540) models are '''''NOT''''' PC's. They run x86 processors but everything surrounding them is completely custom
* Instead of a BIOS they use the "ARC" Firmware loader
* Most of the system is chained behind the "Cobalt", "Lithium" and "Arsenic" chips. These are custom ASIC chips that control most of the system functionality including graphics, sound, access to the "UMA" high-bandwidth memory, the video ports and the (non-functional on 320 series) firewire ports. All x86 peripherals (IDE, RTC and others) are "slaved" behind this chip
* The PCI slots are non-standard voltage at 3.3 volts rather than 5 volts. Making it virtually impossible to add expansion cards to the device
Additionally due to the custom firmware (ARC) and weird ASIC chips, the only two supported OS's are Windows NT4 and Windows 2000. XP won't even boot on this machine.
Linux support was removed many years ago, though due to lack of interest from SGI was never really supported anyway (no accelerated X server among other missing hardware functionality)
'''At this time this unit is not in use'''
[[File:SGI 320 (front).jpg|alt=SGI 320 (front)|none|thumb|SGI 320 (front)]]
[[File:SGI 320 (rear).jpg|alt=SGI 320 (rear)|none|thumb|SGI 320 (rear)]]
d96b7b6b52089b1fa7ff2ea9d546deb287278113
File:Netra T1 (front).jpg
6
42
69
2024-09-10T07:14:45Z
CursedSilicon
1
wikitext
text/x-wiki
Netra T1 (front)
eeac1921f9b009e1e816930f9ee1ededeb652229
File:Netra T1 (Rear).jpg
6
43
70
2024-09-10T07:17:28Z
CursedSilicon
1
wikitext
text/x-wiki
Netra T1 (Rear)
ff8cfb502f8a43b5bca9e0ee5dc154bc4d7a5fd2
Netra T1
0
44
71
2024-09-10T07:17:44Z
CursedSilicon
1
Created page with "Along with its much larger brother the [[Sunfire 420R]] the Netra T1 100 is one of the several pieces of Sun equipment in my collection At this time I don't have much information to post about it. I have not powered any of the Sun equipment on to investigate it deeper Also the face plate fell off. Though apparently that's common with the brittle plastic [[File:Netra T1 (front).jpg|none|thumb|Netra T1 (front)]] File:Netra T1 (Rear).jpg|alt=Netra T1 (Rear)|none|thumb|N..."
wikitext
text/x-wiki
Along with its much larger brother the [[Sunfire 420R]] the Netra T1 100 is one of the several pieces of Sun equipment in my collection
At this time I don't have much information to post about it. I have not powered any of the Sun equipment on to investigate it deeper
Also the face plate fell off. Though apparently that's common with the brittle plastic
[[File:Netra T1 (front).jpg|none|thumb|Netra T1 (front)]]
[[File:Netra T1 (Rear).jpg|alt=Netra T1 (Rear)|none|thumb|Netra T1 (Rear)]]
6a2a552ec44efba013cbc4327803185ab6662a3f
File:Sunfire 420R (Front).jpg
6
46
73
2024-09-10T07:21:21Z
CursedSilicon
1
wikitext
text/x-wiki
Sunfire 420R (Front)
c38c0cedd7b331f8670d1ddc3b6562c70e6bbe89
File:Sunfire 420R (Back).jpg
6
47
74
2024-09-10T07:21:50Z
CursedSilicon
1
wikitext
text/x-wiki
Sunfire 420R (Back)
69a8b852bda0d79f8d96d4b12fba856c2fffe2bd
SunFire Enterprise 420R
0
48
75
2024-09-10T07:22:03Z
CursedSilicon
1
Created page with "The biggest Sun in my collection by far. The Sunfire Enterprise 420R is an 80+ pound beast of metal and loud It will likely be the first machine of the Suns I bring back to life, so watch this page for updates! [[File:Sunfire 420R (Front).jpg|alt=Sunfire 420R (Front)|none|thumb|Sunfire 420R (Front)]] [[File:Sunfire 420R (Back).jpg|alt=Sunfire 420R (Rear)|none|thumb|Sunfire 420R (Rear)]]"
wikitext
text/x-wiki
The biggest Sun in my collection by far. The Sunfire Enterprise 420R is an 80+ pound beast of metal and loud
It will likely be the first machine of the Suns I bring back to life, so watch this page for updates!
[[File:Sunfire 420R (Front).jpg|alt=Sunfire 420R (Front)|none|thumb|Sunfire 420R (Front)]]
[[File:Sunfire 420R (Back).jpg|alt=Sunfire 420R (Rear)|none|thumb|Sunfire 420R (Rear)]]
a9fee50e80b3ab01779c644dafacec393941955b
File:Sun Ultra 10 (front).jpg
6
49
76
2024-09-10T07:22:46Z
CursedSilicon
1
wikitext
text/x-wiki
Sun Ultra 10 (front)
4dfa5b48d2dbd75997a5ccbf386ab358f864a750
File:Other Ultra 10 (Front).jpg
6
50
77
2024-09-10T07:23:46Z
CursedSilicon
1
wikitext
text/x-wiki
Other Ultra 10 (Front)
cd92c78b5d4551567bdf0dccddedd845f43862e8
File:Ultra 10 (Rear).jpg
6
51
78
2024-09-10T07:24:18Z
CursedSilicon
1
wikitext
text/x-wiki
Ultra 10 (Rear)
ef8f479a74672ef83e101ab1b4efa8179bfb9563
File:Other Ultra 10 (Rear).jpg
6
52
79
2024-09-10T07:24:44Z
CursedSilicon
1
wikitext
text/x-wiki
Other Ultra 10 (Rear)
953f6b2dfcdaffa6e722dbc2283fdae07503389c
Ultra 10 Workstation
0
53
80
2024-09-10T07:24:57Z
CursedSilicon
1
Created page with "Another two machines I need to investigate, purchased from Re-PC at some point in 2022 '''The current state of these machines is completely unknown''' [[File:Sun Ultra 10 (front).jpg|alt=Sun Ultra 10 (front)|none|thumb|Sun Ultra 10 (front)]] [[File:Other Ultra 10 (Front).jpg|alt=Other Ultra 10 (Front)|none|thumb|Other Ultra 10 (Front)]] [[File:Ultra 10 (Rear).jpg|alt=Ultra 10 (Rear)|none|thumb|Ultra 10 (Rear)]] File:Other Ultra 10 (Rear).jpg|alt=Other Ultra 10 (Rear)..."
wikitext
text/x-wiki
Another two machines I need to investigate, purchased from Re-PC at some point in 2022
'''The current state of these machines is completely unknown'''
[[File:Sun Ultra 10 (front).jpg|alt=Sun Ultra 10 (front)|none|thumb|Sun Ultra 10 (front)]]
[[File:Other Ultra 10 (Front).jpg|alt=Other Ultra 10 (Front)|none|thumb|Other Ultra 10 (Front)]]
[[File:Ultra 10 (Rear).jpg|alt=Ultra 10 (Rear)|none|thumb|Ultra 10 (Rear)]]
[[File:Other Ultra 10 (Rear).jpg|alt=Other Ultra 10 (Rear)|none|thumb|Other Ultra 10 (Rear)]]
9fd3fb390effbe082bff15f89d4ea4b036231c8e
Old Computers
0
2
81
23
2024-09-10T07:25:55Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference.
<big>'''NOTE: This list is non-exhaustive as I'm constantly picking up new weird old tech'''</big>
=== Acer Inc ===
[[Acer EasyStore H340]]
=== Apple Computers Inc ===
[[Powermac G4]] "Mirror Drive Door" (MDD)
[[Powermac G5]] Quad
[[eMac G4]]
[[Xserve G4]]
[[Xserve G5]]
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ|Cobalt RaQ4]]
=== Dell Computers ===
[[PowerEdge 2500]]
=== Digital Equipment Corporation ===
[[DEC AlphaServer 2100|DEC AlphaServer 2100 4/275]]
=== Hewlett Packard ===
[[HP MediaSmart EX495]]
[[HP KAYAK XA 6/400 MT]]
=== Silicon Graphics ===
[[SGI Octane]]
[[SGI Visual Workstation 320]]
=== Sun Microsystems ===
[[Netra X1]]
[[Netra T1]]
[[SunFire Enterprise 420R]]
[[Ultra 10 Workstation]]
=== Whitebox/custom builds ===
[[Windows 98 PC|World's Fastest Windows 98 PC]]
[[Disc Ripper|Disc Ripper aka "Napster"]]
=== Miscellaneous (Anything not 'retro') ===
[[Framework 13]]
[[Main Desktop]]
[[Home Server]]
[[Hyve Zeus]]
[[Hyve Cygnus]]
[[Video Capture PC]]
47dbb1154f3550fc5a9751aed3d48823936bf404
File:98 PC (Front).jpg
6
54
82
2024-09-10T07:47:28Z
CursedSilicon
1
wikitext
text/x-wiki
98 PC (Front)
84026520d5fe2a15b131ce069085b976892bf8c2
File:98 PC (Side).jpg
6
55
83
2024-09-10T07:47:48Z
CursedSilicon
1
wikitext
text/x-wiki
98 PC (Side)
a81112da30e7ed420b86f093a1ae552a44464003
File:98 PC (Rear).jpg
6
56
84
2024-09-10T07:48:20Z
CursedSilicon
1
wikitext
text/x-wiki
98 PC (Rear)
910685bc9053dcc5e3e116b50b5730e7d530cab9
Windows 98 PC
0
57
85
2024-09-10T07:48:33Z
CursedSilicon
1
Created page with "There's not much I can really add to this page that wasn't already discussed in the [https://www.youtube.com/watch?v=YETxI4rA_gs "Building the REAL "ultimate Windows 98 PC"]" video Since I filmed that video the machine has had some (minor) upgrades * The GTX 7800 has been replaced with a 7900 for a minor performance boost * The weird memory allocation issues have been fixed via the "SPLIT8MB" patch from Rudolph Loew * RAM has been increased from 4GB (4x1GB sticks) to..."
wikitext
text/x-wiki
There's not much I can really add to this page that wasn't already discussed in the [https://www.youtube.com/watch?v=YETxI4rA_gs "Building the REAL "ultimate Windows 98 PC"]" video
Since I filmed that video the machine has had some (minor) upgrades
* The GTX 7800 has been replaced with a 7900 for a minor performance boost
* The weird memory allocation issues have been fixed via the "SPLIT8MB" patch from Rudolph Loew
* RAM has been increased from 4GB (4x1GB sticks) to '''''16GB''''' (4x4GB sticks) though with the caveat that Windows 98 can only address 3.25GB of memory. Rudolph Loew's "ramdisk" patch can be utilized to add up to a 13GB RAM drive for the remaining space, but I do not have a practical reason to use this, yet
* Ethernet has been moved from a PCI based RTL 8169 to a PCI-E 1x RTL8111C. Performance is marginally improved
The machine has also been moved to a Lian Li PC-A70 case. Unfortunately the rear bay is missing and the general build quality of this case is extremely poor
[[File:98 PC (Front).jpg|none|thumb|98 PC (Front)]]
[[File:98 PC (Side).jpg|alt=98 PC (Side)|none|thumb|98 PC (Side)]]
[[File:98 PC (Rear).jpg|alt=98 PC (Rear)|none|thumb|98 PC (Rear)]]
bdd8dbff71acb8818cbaad24174e1f3dc7c6413c
Disc Ripper
0
58
86
2024-09-10T07:53:57Z
CursedSilicon
1
Created page with "The most recent computer I've (largely) finished building. Dubbed "Napster" This machine is most interesting for how uninteresting it is! An i3-6100 Intel "Skylake" CPU and generic MSI motherboard with 16GB of low-speed DDR4 memory attached. The most notable feature of this machine is what it was built for. Featuring '''''nine''''' LG BH16NS58 Blu Ray drives, this machine is able to mass-archive almost every kind of optical media CD produced. Additional information..."
wikitext
text/x-wiki
The most recent computer I've (largely) finished building. Dubbed "Napster"
This machine is most interesting for how uninteresting it is! An i3-6100 Intel "Skylake" CPU and generic MSI motherboard with 16GB of low-speed DDR4 memory attached.
The most notable feature of this machine is what it was built for. Featuring '''''nine''''' LG BH16NS58 Blu Ray drives, this machine is able to mass-archive almost every kind of optical media CD produced.
Additional information about this machines ripping capability can be inferred from the "[https://github.com/saramibreak/DiscImageCreator DiscImageCreator]" Github repository but the tl;dr is this machine is built to create '''''Redump quality''''' disc images of computer software CD's and games
5ae408780a710677859c9cd96972876f17b8740c
87
86
2024-09-10T07:54:18Z
CursedSilicon
1
wikitext
text/x-wiki
The most recent computer I've (largely) finished building. Affectionately nicknamed "Napster"
This machine is most interesting for how uninteresting it is! An i3-6100 Intel "Skylake" CPU and generic MSI motherboard with 16GB of low-speed DDR4 memory attached.
The most notable feature of this machine is what it was built for. Featuring '''''nine''''' LG BH16NS58 Blu Ray drives, this machine is able to mass-archive almost every kind of optical media CD produced.
Additional information about this machines ripping capability can be inferred from the "[https://github.com/saramibreak/DiscImageCreator DiscImageCreator]" Github repository but the tl;dr is this machine is built to create '''''Redump quality''''' disc images of computer software CD's and games
54a6c1b03584b121dbd7887cd0cea708d826c3d2
File:Hyve Cygnus (Front).jpg
6
59
88
2024-09-10T07:58:47Z
CursedSilicon
1
wikitext
text/x-wiki
Hyve Cygnus (Front)
5910323b37ea3d5b2c9dd625d0513e6091d469e8
Hyve Cygnus
0
60
89
2024-09-10T07:58:57Z
CursedSilicon
1
Created page with "The Hyve "Cygnus" is another ex-whitebox-built-for-Facebook en masse server Unlike the [[Hyve Zeus]] the Cygnus was built for disk storage. As such it's capable of supporting '''''ten 3.5" hard disks''''' via its extremely long 1U chassis My unit was graciously gifted by [https://social.sdf.org/@indrora Indrora of SDF fame] and originally dubbed "The Compensator" At this time the unit is not in use, however it is otherwise stock configuration of a Hyve Cygnus ser..."
wikitext
text/x-wiki
The Hyve "Cygnus" is another ex-whitebox-built-for-Facebook en masse server
Unlike the [[Hyve Zeus]] the Cygnus was built for disk storage. As such it's capable of supporting '''''ten 3.5" hard disks''''' via its extremely long 1U chassis
My unit was graciously gifted by [https://social.sdf.org/@indrora Indrora of SDF fame] and originally dubbed "The Compensator"
At this time the unit is not in use, however it is otherwise stock configuration of a Hyve Cygnus server.
[[File:Hyve Cygnus (Front).jpg|alt=Hyve Cygnus (Front)|none|thumb|Hyve Cygnus (Front)]]
b2ab6a6ee4caf56c24149ba8bb3c3a684f0afb9b
Hyve Zeus
0
7
90
22
2024-12-16T02:47:22Z
CursedSilicon
1
wikitext
text/x-wiki
The Hyve "Zeus" is a server made for Facebook before their "Open Compute Project". As a result there's about a bajillion of these things floating around on eBay these days
Hyve Zeus units feature a Super Micro X9DRD-iF motherboard with all PCI-E slots except for one removed
They are usually equipped with some variation of low-end Intel Xeons with passively cooled heatsinks attached
The unit I (unfortunately) upgraded with two top-end Xeon 2697v2's and 128GB of DDR3 ECC memory. As a result the unit now contains two Delta R25 7K RPM fans. The resulting noise of this server renders it virtually unusable in areas with people present
'''It is presently part of the infrastructure of my local hackerspace. However we are likely to retire it in future'''
cde867a8176a62d1ccc3610a90734fdf0f194335
Compu-Global-Hyper-Mega-Net
0
61
91
2025-01-17T20:38:49Z
CursedSilicon
1
Created page with "Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have an..."
wikitext
text/x-wiki
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
d24167fa524a7eb22c0c5b32be92617d27069326
92
91
2025-01-17T20:44:20Z
CursedSilicon
1
wikitext
text/x-wiki
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
== '''As an additional project, folks are being recruited to help set up infrastructure and services to run on CGHMN once it launches officially. If you have services you would like to help get running on this vintage intranet, [https://social.restless.systems/@CursedSilicon please reach out via Mastodon]''' ==
e7ca5a5a77a5840e9d314670d448e0f7440dfb6f
93
92
2025-01-17T21:44:35Z
CursedSilicon
1
wikitext
text/x-wiki
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
== '''As an additional project, folks are being recruited to help set up infrastructure and services to run on CGHMN once it launches officially. If you have services you would like to help get running on this vintage intranet, [https://social.restless.systems/@CursedSilicon please reach out via Mastodon]''' ==
=== Currently we need mainly retro sysadmins, web developers/designers and networking folks. Hardware (and hosting) is doable, we just need stuff to *run* on it! ===
8556fd0a697b0d2e57d6d5e44bcb8da311eda818
94
93
2025-01-20T23:43:28Z
CursedSilicon
1
wikitext
text/x-wiki
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
= '''Currently we're looking to recruit volunteers for Sysadmin/Sysop, building websites (think Geocities), running old game servers and other software, network engineers and anyone and everyone who has the technical capability to help out and volunteer their time. Donations to fund the network are also welcome but are entirely optional. If you would like to do either [https://social.restless.systems/@CursedSilicon please reach out via Mastodon]''' =
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it? ===
We're currently exploring the best way(s) to allow users to connect their machines to the network. Our intention is to provide as varied a list of options as possible. Current outlined methods under investigation are
* '''Real V.92 Dial-Up service'''. Pending the ability to acquire a [[wikipedia:Primary_Rate_Interface|PRI line]] we would be able to provide dial-in services via a 425 or 206 area code phone number. This service would likely be limited to 24 concurrent users and would be shared with VoIP users
* '''Dial-In via VoIP'''. A user on Mastodon has claimed to have successfully run Dial-Up service over VoIP even with an international connection from China to South America. This needs to be explored further
* '''Ethernet tunneling/emulation'''. Similar to how early DOCSIS Cable modems worked with just an ethernet jack on the rear of the device and DHCP. Users can purchase an '''''OpenWRT compatible''''' device such as a Raspberry Pi (any model) or a [https://store-us.gl-inet.com/products/us-local-delivery-shadow-mini-smart-router-powerful-wireless-performance-travel-wifi-gl-ar300m16 GL-AR300M16] and then connect to the network. A network switch can be optionally used to connect multiple devices in parallel, or a router may be preferable in order to add NAT functionality and prevent local network services (such as DHCP) from "leaking" back out into the wider network.
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Current plans are to offer V.92 (56Kbps), DSL (1Mbps/256K) and T1 (1.5Mbps symmetric) services.
An optional donation tier may be added (either 10Mbps or 100Mbps) for users who want to financially support the network (costs of electricity, server upkeep and other factors)
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
d6ec8f8fc662d6e7e0b26ec4bbf5505c17832b4b
95
94
2025-01-20T23:43:45Z
CursedSilicon
1
/* Currently we're looking to recruit volunteers for Sysadmin/Sysop, building websites (think Geocities), running old game servers and other software, network engineers and anyone and everyone who has the technical capability to help out and volun */
wikitext
text/x-wiki
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
<blockquote>
= '''Currently we're looking to recruit volunteers for Sysadmin/Sysop, building websites (think Geocities), running old game servers and other software, network engineers and anyone and everyone who has the technical capability to help out and volunteer their time. Donations to fund the network are also welcome but are entirely optional. If you would like to do either [https://social.restless.systems/@CursedSilicon please reach out via Mastodon]''' =
</blockquote>
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it? ===
We're currently exploring the best way(s) to allow users to connect their machines to the network. Our intention is to provide as varied a list of options as possible. Current outlined methods under investigation are
* '''Real V.92 Dial-Up service'''. Pending the ability to acquire a [[wikipedia:Primary_Rate_Interface|PRI line]] we would be able to provide dial-in services via a 425 or 206 area code phone number. This service would likely be limited to 24 concurrent users and would be shared with VoIP users
* '''Dial-In via VoIP'''. A user on Mastodon has claimed to have successfully run Dial-Up service over VoIP even with an international connection from China to South America. This needs to be explored further
* '''Ethernet tunneling/emulation'''. Similar to how early DOCSIS Cable modems worked with just an ethernet jack on the rear of the device and DHCP. Users can purchase an '''''OpenWRT compatible''''' device such as a Raspberry Pi (any model) or a [https://store-us.gl-inet.com/products/us-local-delivery-shadow-mini-smart-router-powerful-wireless-performance-travel-wifi-gl-ar300m16 GL-AR300M16] and then connect to the network. A network switch can be optionally used to connect multiple devices in parallel, or a router may be preferable in order to add NAT functionality and prevent local network services (such as DHCP) from "leaking" back out into the wider network.
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Current plans are to offer V.92 (56Kbps), DSL (1Mbps/256K) and T1 (1.5Mbps symmetric) services.
An optional donation tier may be added (either 10Mbps or 100Mbps) for users who want to financially support the network (costs of electricity, server upkeep and other factors)
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
4ae488e4d833015adbe51116da9e086e5494ae95
96
95
2025-01-20T23:44:06Z
CursedSilicon
1
wikitext
text/x-wiki
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
<blockquote>
= '''Currently we're looking to recruit volunteers for Sysadmin/Sysop, building websites (think Geocities), running old game servers and other software, network engineers and anyone and everyone who has the technical capability to help out and volunteer their time. Donations to fund the network are also welcome but are entirely optional. If you would like to do either [https://social.restless.systems/@CursedSilicon please reach out via Mastodon]''' =
</blockquote>
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it? ===
We're currently exploring the best way(s) to allow users to connect their machines to the network. Our intention is to provide as varied a list of options as possible. Current outlined methods under investigation are
* '''Real V.92 Dial-Up service'''. Pending the ability to acquire a [[wikipedia:Primary_Rate_Interface|PRI line]] we would be able to provide dial-in services via a 425 or 206 area code phone number. This service would likely be limited to 24 concurrent users and would be shared with VoIP users
* '''Dial-In via VoIP'''. A user on Mastodon has claimed to have successfully run Dial-Up service over VoIP even with an international connection from China to South America. This needs to be explored further
* '''Ethernet tunneling/emulation'''. Similar to how early DOCSIS Cable modems worked with just an ethernet jack on the rear of the device and DHCP. Users can purchase an '''''OpenWRT compatible''''' device such as a Raspberry Pi (any model) or a [https://store-us.gl-inet.com/products/us-local-delivery-shadow-mini-smart-router-powerful-wireless-performance-travel-wifi-gl-ar300m16 GL-AR300M16] and then connect to the network. A network switch can be optionally used to connect multiple devices in parallel, or a router may be preferable in order to add NAT functionality and prevent local network services (such as DHCP) from "leaking" back out into the wider network.
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Current plans are to offer V.92 (56Kbps), DSL (1Mbps/256K) and T1 (1.5Mbps symmetric) services.
An optional donation tier may be added (either 10Mbps or 100Mbps) for users who want to financially support the network (costs of electricity, server upkeep and other factors)
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
8ab8c4c2d76433e990918bb7361340d63f632e33
97
96
2025-01-20T23:44:27Z
CursedSilicon
1
wikitext
text/x-wiki
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it? ===
We're currently exploring the best way(s) to allow users to connect their machines to the network. Our intention is to provide as varied a list of options as possible. Current outlined methods under investigation are
* '''Real V.92 Dial-Up service'''. Pending the ability to acquire a [[wikipedia:Primary_Rate_Interface|PRI line]] we would be able to provide dial-in services via a 425 or 206 area code phone number. This service would likely be limited to 24 concurrent users and would be shared with VoIP users
* '''Dial-In via VoIP'''. A user on Mastodon has claimed to have successfully run Dial-Up service over VoIP even with an international connection from China to South America. This needs to be explored further
* '''Ethernet tunneling/emulation'''. Similar to how early DOCSIS Cable modems worked with just an ethernet jack on the rear of the device and DHCP. Users can purchase an '''''OpenWRT compatible''''' device such as a Raspberry Pi (any model) or a [https://store-us.gl-inet.com/products/us-local-delivery-shadow-mini-smart-router-powerful-wireless-performance-travel-wifi-gl-ar300m16 GL-AR300M16] and then connect to the network. A network switch can be optionally used to connect multiple devices in parallel, or a router may be preferable in order to add NAT functionality and prevent local network services (such as DHCP) from "leaking" back out into the wider network.
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Current plans are to offer V.92 (56Kbps), DSL (1Mbps/256K) and T1 (1.5Mbps symmetric) services.
An optional donation tier may be added (either 10Mbps or 100Mbps) for users who want to financially support the network (costs of electricity, server upkeep and other factors)
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
'''Currently we're looking to recruit volunteers for Sysadmin/Sysop, building websites (think Geocities), running old game servers and other software, network engineers and anyone and everyone who has the technical capability to help out and volunteer their time. Donations to fund the network are also welcome but are entirely optional. If you would like to do either [https://social.restless.systems/@CursedSilicon please reach out via Mastodon]'''
3474e7ada94e4af02a6ec2b6d45cc8b74b6d6132
98
97
2025-01-20T23:44:50Z
CursedSilicon
1
wikitext
text/x-wiki
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it? ===
We're currently exploring the best way(s) to allow users to connect their machines to the network. Our intention is to provide as varied a list of options as possible. Current outlined methods under investigation are
* '''Real V.92 Dial-Up service'''. Pending the ability to acquire a [[wikipedia:Primary_Rate_Interface|PRI line]] we would be able to provide dial-in services via a 425 or 206 area code phone number. This service would likely be limited to 24 concurrent users and would be shared with VoIP users
* '''Dial-In via VoIP'''. A user on Mastodon has claimed to have successfully run Dial-Up service over VoIP even with an international connection from China to South America. This needs to be explored further
* '''Ethernet tunneling/emulation'''. Similar to how early DOCSIS Cable modems worked with just an ethernet jack on the rear of the device and DHCP. Users can purchase an '''''OpenWRT compatible''''' device such as a Raspberry Pi (any model) or a [https://store-us.gl-inet.com/products/us-local-delivery-shadow-mini-smart-router-powerful-wireless-performance-travel-wifi-gl-ar300m16 GL-AR300M16] and then connect to the network. A network switch can be optionally used to connect multiple devices in parallel, or a router may be preferable in order to add NAT functionality and prevent local network services (such as DHCP) from "leaking" back out into the wider network.
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Current plans are to offer V.92 (56Kbps), DSL (1Mbps/256K) and T1 (1.5Mbps symmetric) services.
An optional donation tier may be added (either 10Mbps or 100Mbps) for users who want to financially support the network (costs of electricity, server upkeep and other factors)
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
'''<big>Currently we're looking to recruit volunteers for Sysadmin/Sysop, building websites (think Geocities), running old game servers and other software, network engineers and anyone and everyone who has the technical capability to help out and volunteer their time. Donations to fund the network are also welcome but are entirely optional. If you would like to do either [https://social.restless.systems/@CursedSilicon please reach out via Mastodon]</big>'''
824f97a16b022cc868c60aae13bd5950a792d136
99
98
2025-01-20T23:45:14Z
CursedSilicon
1
wikitext
text/x-wiki
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it? ===
We're currently exploring the best way(s) to allow users to connect their machines to the network. Our intention is to provide as varied a list of options as possible. Current outlined methods under investigation are
* '''Real V.92 Dial-Up service'''. Pending the ability to acquire a [[wikipedia:Primary_Rate_Interface|PRI line]] we would be able to provide dial-in services via a 425 or 206 area code phone number. This service would likely be limited to 24 concurrent users and would be shared with VoIP users
* '''Dial-In via VoIP'''. A user on Mastodon has claimed to have successfully run Dial-Up service over VoIP even with an international connection from China to South America. This needs to be explored further
* '''Ethernet tunneling/emulation'''. Similar to how early DOCSIS Cable modems worked with just an ethernet jack on the rear of the device and DHCP. Users can purchase an '''''OpenWRT compatible''''' device such as a Raspberry Pi (any model) or a [https://store-us.gl-inet.com/products/us-local-delivery-shadow-mini-smart-router-powerful-wireless-performance-travel-wifi-gl-ar300m16 GL-AR300M16] and then connect to the network. A network switch can be optionally used to connect multiple devices in parallel, or a router may be preferable in order to add NAT functionality and prevent local network services (such as DHCP) from "leaking" back out into the wider network.
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Current plans are to offer V.92 (56Kbps), DSL (1Mbps/256K) and T1 (1.5Mbps symmetric) services.
An optional donation tier may be added (either 10Mbps or 100Mbps) for users who want to financially support the network (costs of electricity, server upkeep and other factors)
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
<blockquote>'''<big>Currently we're looking to recruit volunteers for Sysadmin/Sysop, building websites (think Geocities), running old game servers and other software, network engineers and anyone and everyone who has the technical capability to help out and volunteer their time. Donations to fund the network are also welcome but are entirely optional. If you would like to do either [https://social.restless.systems/@CursedSilicon please reach out via Mastodon]</big>'''</blockquote>
c3ae65d5f4d6109438880899e492339b3ff9330c
100
99
2025-01-29T15:40:50Z
CursedSilicon
1
wikitext
text/x-wiki
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it? ===
We're currently exploring the best way(s) to allow users to connect their machines to the network. Our intention is to provide as varied a list of options as possible. Current outlined methods under investigation are
* '''Real V.92 Dial-Up service'''. Pending the ability to acquire a [[wikipedia:Primary_Rate_Interface|PRI line]] we would be able to provide dial-in services via a 425 or 206 area code phone number. This service would likely be limited to 24 concurrent users and would be shared with VoIP users
* '''Dial-In via VoIP'''. A user on Mastodon has claimed to have successfully run Dial-Up service over VoIP even with an international connection from China to South America. This needs to be explored further
* '''Ethernet tunneling/emulation'''. Similar to how early DOCSIS Cable modems worked with just an ethernet jack on the rear of the device and DHCP. Users can purchase an '''''OpenWRT compatible''''' device such as a Raspberry Pi (any model) or a [https://store-us.gl-inet.com/products/us-local-delivery-shadow-mini-smart-router-powerful-wireless-performance-travel-wifi-gl-ar300m16 GL-AR300M16] and then connect to the network. A network switch can be optionally used to connect multiple devices in parallel, or a router may be preferable in order to add NAT functionality and prevent local network services (such as DHCP) from "leaking" back out into the wider network.
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Current plans are to offer V.92 (56Kbps), DSL (1Mbps/256K) and T1 (1.5Mbps symmetric) services.
An optional donation tier may be added (either 10Mbps or 100Mbps) for users who want to financially support the network (costs of electricity, server upkeep and other factors)
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
=== How can I help? ===
A lot of folks have offered to donate server hosting which is wonderful. Though not (yet!) required. The two biggest things we need are
'''Donations to buy infrastructure''' (Particularly hard disks!) there's an Amazon Wishlist here that will get updated over time. https://www.amazon.com/hz/wishlist/ls/1W3S0E9IN7ZB7?ref_=wl_share
'''Volunteers who want to set up services'''. Once we've got the servers set up and running, well, we need '''''stuff''''' to run on them. Wanna make a 90's website or run a server for some old game you like? Get in touch via Mastodon, [https://discord.gg/scMGtSnx5c or via the Discord server]
20a650667832229cfb745e828c594240f52510fd
101
100
2025-01-29T17:59:36Z
CursedSilicon
1
wikitext
text/x-wiki
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it? ===
We're currently exploring the best way(s) to allow users to connect their machines to the network. Our intention is to provide as varied a list of options as possible. Current outlined methods under investigation are
* '''Real V.92 Dial-Up service'''. Pending the ability to acquire a [[wikipedia:Primary_Rate_Interface|PRI line]] we would be able to provide dial-in services via a 425 or 206 area code phone number. This service would likely be limited to 24 concurrent users and would be shared with VoIP users
* '''Dial-In via VoIP'''. A user on Mastodon has claimed to have successfully run Dial-Up service over VoIP even with an international connection from China to South America. This needs to be explored further
* '''Ethernet tunneling/emulation'''. Similar to how early DOCSIS Cable modems worked with just an ethernet jack on the rear of the device and DHCP. Users can purchase an '''''OpenWRT compatible''''' device such as a Raspberry Pi (any model) or a [https://store-us.gl-inet.com/products/us-local-delivery-shadow-mini-smart-router-powerful-wireless-performance-travel-wifi-gl-ar300m16 GL-AR300M16] and then connect to the network. A network switch can be optionally used to connect multiple devices in parallel, or a router may be preferable in order to add NAT functionality and prevent local network services (such as DHCP) from "leaking" back out into the wider network.
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Current plans are to offer V.92 (56Kbps), DSL (1Mbps/256K) and T1 (1.5Mbps symmetric) services.
An optional donation tier may be added (either 10Mbps or 100Mbps) for users who want to financially support the network (costs of electricity, server upkeep and other factors)
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
=== How can I help? ===
A lot of folks have offered to donate server hosting which is wonderful. Though not (yet!) required. The two biggest things we need are
'''Donations to buy infrastructure''' (Particularly hard disks!) there's an Amazon Wishlist here that will get updated over time. https://www.amazon.com/hz/wishlist/ls/1W3S0E9IN7ZB7?ref_=wl_share
'''Volunteers who want to set up services'''. Once we've got the servers set up and running, well, we need '''''stuff''''' to run on them. Wanna make a 90's website or run a server for some old game you like? Get in touch [https://social.restless.systems/@CursedSilicon via Mastodon], [https://discord.gg/scMGtSnx5c or via the Discord server]
98c7b2ff81774041774beabb759823608c77cbbe
File:PXL 20250214 033500161.jpg
6
62
102
2025-02-14T23:08:34Z
CursedSilicon
1
wikitext
text/x-wiki
XPS Pro 200N (front)
063492bfd1852f0412c3edb4caebdf296f001970
File:PXL 20250214 033516741.jpg
6
63
103
2025-02-14T23:08:53Z
CursedSilicon
1
wikitext
text/x-wiki
XPS Pro 200N (rear)
6b5a3915cd39ec43e3ee678179b5da28fa5f43c3
Dell XPS Pro200N
0
64
104
2025-02-14T23:09:52Z
CursedSilicon
1
Created page with "Recent pickup from a University of Washington (UW) auction. Reading online this unit seems to be equipped with a 200Mhz(!) Pentium Pro processor The amount of RAM has not been directly tested, but according to the part number MT18LD1672G-6X may be 128MB (the max supported by the motherboard) At this time the machine does not (yet) have any uses. The Pentium Pro performs poorly with 16-bit code which makes running Windows 3.1 or 95 on it undesirable Early Linux may a..."
wikitext
text/x-wiki
Recent pickup from a University of Washington (UW) auction.
Reading online this unit seems to be equipped with a 200Mhz(!) Pentium Pro processor
The amount of RAM has not been directly tested, but according to the part number MT18LD1672G-6X may be 128MB (the max supported by the motherboard)
At this time the machine does not (yet) have any uses. The Pentium Pro performs poorly with 16-bit code which makes running Windows 3.1 or 95 on it undesirable
Early Linux may also be an option for this device as emulation via 86box is ''difficult''
Images of this device also show several (unknown) expansion cards from what ever it was being used for originally. These have been removed after photographing
[[File:PXL 20250214 033500161.jpg|thumb|alt=XPS Pro 200N (front)|XPS Pro 200N (front)]]
[[File:PXL 20250214 033516741.jpg|thumb|alt=XPS Pro 200N (rear)|XPS Pro 200N (rear)]]
112c42448ddfdbe4d0535e61e28dd3f43c47de44
108
104
2025-02-17T18:28:40Z
CursedSilicon
1
Thumbnails unfucked?
wikitext
text/x-wiki
Recent pickup from a University of Washington (UW) auction.
Reading online this unit seems to be equipped with a 200Mhz(!) Pentium Pro processor
The amount of RAM has not been directly tested, but according to the part number MT18LD1672G-6X may be 128MB (the max supported by the motherboard)
At this time the machine does not (yet) have any uses. The Pentium Pro performs poorly with 16-bit code which makes running Windows 3.1 or 95 on it undesirable
Early Linux may also be an option for this device as emulation via 86box is ''difficult''
Images of this device also show several (unknown) expansion cards from what ever it was being used for originally. These have been removed after photographing
[[File:PXL 20250214 033500161.jpg|thumb|alt=XPS Pro 200N (front)|XPS Pro 200N (front)]]
[[File:PXL 20250214 033516741.jpg|thumb|alt=XPS Pro 200N (rear)|PS Pro 200N (rear)]]
4f105ea80b31fed00b7fa53434f59f6b1a4deae7
File:Test.jpeg
6
66
107
2025-02-14T23:28:18Z
CursedSilicon
1
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Optiplex GX1 (Front).jpg
6
67
109
2025-02-17T18:46:46Z
CursedSilicon
1
wikitext
text/x-wiki
Optiplex GX1 (Front)
d0f221921efa1a65985493149d704d62d3b4f507
File:Optiplex GX1 (Rear).jpg
6
68
110
2025-02-17T18:47:07Z
CursedSilicon
1
wikitext
text/x-wiki
Optiplex GX1 (Rear)
cd4be2230e467dfae172379dc59947609f745116
File:XPS D266 (front).jpg
6
70
112
2025-02-17T18:52:13Z
CursedSilicon
1
wikitext
text/x-wiki
XPS D266 (front)
fcb17e3331e0c6ac7f817f334792a08f848428b4
File:XPS D266 (rear).jpg
6
71
113
2025-02-17T18:53:12Z
CursedSilicon
1
wikitext
text/x-wiki
XPS D266 (rear)
2add2a9e4494a8f30c78ffd0445408295d8b13ad
Dimension XPS D266
0
72
114
2025-02-17T18:53:20Z
CursedSilicon
1
Created page with "As with the other Dell towers, this unit was another pickup from the University of Washington auction Also similarly to the newer [[Optiplex GX1]] this nit also includes a proprietary power supply. According to TheRetroWeb this unit could be outfitted with a 233/266/300/333Mhz Pentium II, making this 266 a "mid-range" model. RAM could be expanded up to 3x 128MB of SDR UDIMM's (384MB total) This unit also appears to contain a (likely IDE based) ZIP 250MB drive. Though..."
wikitext
text/x-wiki
As with the other Dell towers, this unit was another pickup from the University of Washington auction
Also similarly to the newer [[Optiplex GX1]] this nit also includes a proprietary power supply.
According to TheRetroWeb this unit could be outfitted with a 233/266/300/333Mhz Pentium II, making this 266 a "mid-range" model. RAM could be expanded up to 3x 128MB of SDR UDIMM's (384MB total)
This unit also appears to contain a (likely IDE based) ZIP 250MB drive. Though it is untested at this time.
[[File:XPS D266 (front).jpg|thumb|alt=XPS D266 (front)|XPS D266 (front)]]
[[File:XPS D266 (rear).jpg|thumb|alt=XPS D266 (rear)|XPS D266 (rear)]]
75594e2871d12df7159ca6ae756ca837fff14caf
115
114
2025-02-17T18:53:46Z
CursedSilicon
1
wikitext
text/x-wiki
As with the other Dell towers, this unit was another pickup from the University of Washington auction
Also similarly to the newer [[OptiPlex GX1|Optiplex GX1]] this nit also includes a proprietary power supply.
According to TheRetroWeb this unit could be outfitted with a 233/266/300/333Mhz Pentium II, making this 266 a "mid-range" model. RAM could be expanded up to 3x 128MB of SDR UDIMM's (384MB total)
This unit also appears to contain a (likely IDE based) ZIP 250MB drive. Though it is untested at this time.
[[File:XPS D266 (front).jpg|thumb|alt=XPS D266 (front)|XPS D266 (front)]]
[[File:XPS D266 (rear).jpg|thumb|alt=XPS D266 (rear)|XPS D266 (rear)]]
8f6dc7cb60fbfe7563a00a94fe604ab59871a254
116
115
2025-02-17T18:53:55Z
CursedSilicon
1
wikitext
text/x-wiki
As with the other Dell towers, this unit was another pickup from the University of Washington auction
Also similarly to the newer [[OptiPlex GX1|Optiplex GX1]] this unit also includes a proprietary power supply.
According to TheRetroWeb this unit could be outfitted with a 233/266/300/333Mhz Pentium II, making this 266 a "mid-range" model. RAM could be expanded up to 3x 128MB of SDR UDIMM's (384MB total)
This unit also appears to contain a (likely IDE based) ZIP 250MB drive. Though it is untested at this time.
[[File:XPS D266 (front).jpg|thumb|alt=XPS D266 (front)|XPS D266 (front)]]
[[File:XPS D266 (rear).jpg|thumb|alt=XPS D266 (rear)|XPS D266 (rear)]]
b5e597822dcbb95ef28833b20c6c3d32f64e5dc8
Old Computers
0
2
117
81
2025-02-18T00:10:17Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference.
<big>'''NOTE: This list is non-exhaustive as I'm constantly picking up new weird old tech'''</big>
=== Acer Inc ===
[[Acer EasyStore H340]]
=== Apple Computers Inc ===
[[Powermac G4]] "Mirror Drive Door" (MDD)
[[Powermac G5]] Quad
[[eMac G4]]
[[Xserve G4]]
[[Xserve G5]]
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ|Cobalt RaQ4]]
=== Dell Computers ===
[[PowerEdge 2500]]
[[OptiPlex GX1]]
[[Dell XPS Pro200N|XPS Pro200N]]
[[Dimension XPS D266]]
=== Digital Equipment Corporation ===
[[DEC AlphaServer 2100|DEC AlphaServer 2100 4/275]]
=== Hewlett Packard ===
[[HP MediaSmart EX495]]
[[HP KAYAK XA 6/400 MT]]
=== Silicon Graphics ===
[[SGI Octane]]
[[SGI Visual Workstation 320]]
=== Sun Microsystems ===
[[Netra X1]]
[[Netra T1]]
[[SunFire Enterprise 420R]]
[[Ultra 10 Workstation]]
=== Whitebox/custom builds ===
[[Windows 98 PC|World's Fastest Windows 98 PC]]
[[Disc Ripper|Disc Ripper aka "Napster"]]
=== Miscellaneous (Anything not 'retro') ===
[[Framework 13]]
[[Main Desktop]]
[[Home Server]]
[[Hyve Zeus]]
[[Hyve Cygnus]]
[[Video Capture PC]]
0f1c47e7555c0e41e1bc029afd0e52aa96c25748
142
117
2025-04-18T23:21:11Z
CursedSilicon
1
Mac Mini G4 added
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference.
<big>'''NOTE: This list is non-exhaustive as I'm constantly picking up new weird old tech'''</big>
=== Acer Inc ===
[[Acer EasyStore H340]]
=== Apple Computers Inc ===
[[Powermac G4]] "Mirror Drive Door" (MDD)
[[Powermac G5]] Quad
[[eMac G4]]
[[Mac Mini G4]]
[[Xserve G4]]
[[Xserve G5]]
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ|Cobalt RaQ4]]
=== Dell Computers ===
[[PowerEdge 2500]]
[[OptiPlex GX1]]
[[Dell XPS Pro200N|XPS Pro200N]]
[[Dimension XPS D266]]
=== Digital Equipment Corporation ===
[[DEC AlphaServer 2100|DEC AlphaServer 2100 4/275]]
=== Hewlett Packard ===
[[HP MediaSmart EX495]]
[[HP KAYAK XA 6/400 MT]]
=== Silicon Graphics ===
[[SGI Octane]]
[[SGI Visual Workstation 320]]
=== Sun Microsystems ===
[[Netra X1]]
[[Netra T1]]
[[SunFire Enterprise 420R]]
[[Ultra 10 Workstation]]
=== Whitebox/custom builds ===
[[Windows 98 PC|World's Fastest Windows 98 PC]]
[[Disc Ripper|Disc Ripper aka "Napster"]]
=== Miscellaneous (Anything not 'retro') ===
[[Framework 13]]
[[Main Desktop]]
[[Home Server]]
[[Hyve Zeus]]
[[Hyve Cygnus]]
[[Video Capture PC]]
8684a842fa7066e7d07db49ecc6e84fb6ba1a21d
IMac G3 "Blueberry"
0
73
119
2025-02-18T00:17:08Z
CursedSilicon
1
Created page with "TBA"
wikitext
text/x-wiki
TBA
ae50ce81c0ab15346851715818b855eed68b0618
User:CursedSilicon
2
74
120
2025-02-20T01:30:43Z
CursedSilicon
1
Created page with "Oh. Apparently I have a page for myself as a user If you need me for anything please reach out to my Mastodon https://social.restless.systems/@CursedSilicon"
wikitext
text/x-wiki
Oh. Apparently I have a page for myself as a user
If you need me for anything please reach out to my Mastodon
https://social.restless.systems/@CursedSilicon
218cca8b4b8240ff36298a12b4f13300c16ea631
Compu-Global-Hyper-Mega-Net
0
61
121
101
2025-02-20T19:51:27Z
CursedSilicon
1
The question mark gets stripped from embedding the URL which breaks hotlinking to the specific point in the page
wikitext
text/x-wiki
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it ===
We're currently exploring the best way(s) to allow users to connect their machines to the network. Our intention is to provide as varied a list of options as possible. Current outlined methods under investigation are
* '''Real V.92 Dial-Up service'''. Pending the ability to acquire a [[wikipedia:Primary_Rate_Interface|PRI line]] we would be able to provide dial-in services via a 425 or 206 area code phone number. This service would likely be limited to 24 concurrent users and would be shared with VoIP users
* '''Dial-In via VoIP'''. A user on Mastodon has claimed to have successfully run Dial-Up service over VoIP even with an international connection from China to South America. This needs to be explored further
* '''Ethernet tunneling/emulation'''. Similar to how early DOCSIS Cable modems worked with just an ethernet jack on the rear of the device and DHCP. Users can purchase an '''''OpenWRT compatible''''' device such as a Raspberry Pi (any model) or a [https://store-us.gl-inet.com/products/us-local-delivery-shadow-mini-smart-router-powerful-wireless-performance-travel-wifi-gl-ar300m16 GL-AR300M16] and then connect to the network. A network switch can be optionally used to connect multiple devices in parallel, or a router may be preferable in order to add NAT functionality and prevent local network services (such as DHCP) from "leaking" back out into the wider network.
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Current plans are to offer V.92 (56Kbps), DSL (1Mbps/256K) and T1 (1.5Mbps symmetric) services.
An optional donation tier may be added (either 10Mbps or 100Mbps) for users who want to financially support the network (costs of electricity, server upkeep and other factors)
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
=== How can I help? ===
A lot of folks have offered to donate server hosting which is wonderful. Though not (yet!) required. The two biggest things we need are
'''Donations to buy infrastructure''' (Particularly hard disks!) there's an Amazon Wishlist here that will get updated over time. https://www.amazon.com/hz/wishlist/ls/1W3S0E9IN7ZB7?ref_=wl_share
'''Volunteers who want to set up services'''. Once we've got the servers set up and running, well, we need '''''stuff''''' to run on them. Wanna make a 90's website or run a server for some old game you like? Get in touch [https://social.restless.systems/@CursedSilicon via Mastodon], [https://discord.gg/scMGtSnx5c or via the Discord server]
0c3edf13809364142f20017fedfe087b7041e80a
137
121
2025-04-03T21:06:43Z
CursedSilicon
1
Tweaking as the service has evolved
wikitext
text/x-wiki
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it ===
You can sign up '''[[Signup|right now]]!''' to "alpha test" the network
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
=== How can I help? ===
A lot of folks have offered to donate server hosting which is wonderful. Though not (yet!) required. The two biggest things we need are
'''Donations to buy infrastructure''' (Particularly hard disks!) there's an Amazon Wishlist here that will get updated over time. https://www.amazon.com/hz/wishlist/ls/1W3S0E9IN7ZB7?ref_=wl_share
'''Volunteers who want to set up services'''. Want to come build a website? Run an old game server? Have some weird retro hardware you want to attach to the network? Please, reach out!
64d9654a94aa10ebd6b008ed8873782fd0cb83e1
138
137
2025-04-03T21:42:05Z
CursedSilicon
1
wikitext
text/x-wiki
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it ===
You can sign up '''[[Signup|right now]]!''' to "alpha test" the network
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Your speed will depend on factors such as how fast your device can run Wireguard and your internet connection
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
=== How can I help? ===
A lot of folks have offered to donate server hosting which is wonderful. Though not (yet!) required. The two biggest things we need are
'''Donations to buy infrastructure''' (Particularly hard disks!) there's an Amazon Wishlist here that will get updated over time. https://www.amazon.com/hz/wishlist/ls/1W3S0E9IN7ZB7?ref_=wl_share
'''Volunteers who want to set up services'''. Want to come build a website? Run an old game server? Have some weird retro hardware you want to attach to the network? Please, reach out!
4d7cdd6f3a19d054282cae96a34aca394af45542
Signup
0
75
122
2025-03-18T18:45:46Z
CursedSilicon
1
Created page with "So! You want to be a member of CompuGlobalHyperMegaNet? Excellent! Here's how you sign up Firstly you'll need to join the [https://discord.gg/TnpSG2P677 Cursed Silicon Discord]. Ping one of our Mod staff and request access to the #compu-global-hyper-mega-net channel Once in there let us know what you'd like to build or run. A few helpful specifics - Do you have Systems Admin/Network Admin skills? Do you need help with the stuff you'd like to run? - Are you volun..."
wikitext
text/x-wiki
So! You want to be a member of CompuGlobalHyperMegaNet?
Excellent! Here's how you sign up
Firstly you'll need to join the [https://discord.gg/TnpSG2P677 Cursed Silicon Discord].
Ping one of our Mod staff and request access to the #compu-global-hyper-mega-net channel
Once in there let us know what you'd like to build or run. A few helpful specifics
- Do you have Systems Admin/Network Admin skills? Do you need help with the stuff you'd like to run?
- Are you volunteering as a single user or are you participating as part of a group?
- Are you intending to use CGHMN's hosting, or do you want to simply attach your own retro hardware to the network?
- What are the best ways we can contact you (usually just in case anything breaks)
Once that's all sorted we'll help you get your project off the ground and running on the network as best we can.
Once it's up and running though please keep in mind '''you will be responsible for maintaining it'''
39e04dbf52ad0b2e19e743e84b45cb8a20626337
123
122
2025-03-18T18:47:38Z
CursedSilicon
1
wikitext
text/x-wiki
So! You want to be a member of CompuGlobalHyperMegaNet?
Excellent! Here's how you sign up
Firstly you'll need to join the [https://discord.gg/TnpSG2P677 Cursed Silicon Discord].
Ping one of our Mod staff and request access to the '''#compu-global-hyper-mega-net''' channel
After you've been granted access to the channel, @compu-global-hyper-mega-net and let us know what you'd like to build or run. A few helpful specifics
* Do you have Systems Admin/Network Admin skills? Do you need help with the stuff you'd like to run?
* Are you volunteering as a single user or are you participating as part of a group?
* Are you intending to use CGHMN's hosting, or do you want to simply attach your own retro hardware to the network?
* What are the best ways we can contact you (usually just in case anything breaks)
Once that's all sorted we'll help you get your project off the ground and running on the network as best we can.
Once it's up and running though please keep in mind '''you will be responsible for maintaining it'''
Once it's up and running though please keep in mind '''you will be responsible for maintaining it'''
692bfdc333a2c484c9cf4fe3c492071eeaef5f8a
124
123
2025-03-18T20:39:31Z
CursedSilicon
1
wikitext
text/x-wiki
So! You want to be a member of CompuGlobalHyperMegaNet?
Excellent! Here's how you sign up
Firstly you'll need to join the [https://discord.gg/TnpSG2P677 Cursed Silicon Discord].
Ping one of our Mod staff and request access to the '''#compu-global-hyper-mega-net''' channel
After you've been granted access to the channel, @compu-global-hyper-mega-net and let us know what you'd like to build or run. A few helpful specifics
* Do you have Systems Admin/Network Admin skills? Do you need help with the stuff you'd like to run?
* Are you volunteering as a single user or are you participating as part of a group?
* Are you intending to use CGHMN's hosting, or do you want to simply attach your own retro hardware to the network?
* What are the best ways we can contact you (usually just in case anything breaks)
Once that's all sorted we'll help you get your project off the ground and running on the network as best we can.
Once it's up and running though please keep in mind '''you will be responsible for maintaining it'''
75c3978ba64709369245ffd122cc5c01a221f437
CGHMN-Demo-Network
0
76
125
2025-03-20T02:57:56Z
Snep
5
Details about the demo CGHMN network for the SDF Interim Computer Festival
wikitext
text/x-wiki
=== Demo Network for the Interim Computer Festival ===
This page documents the quickly set up demo network to show off the CGHMN network at the [https://sdf.org/icf/ SDF's Interim Computer Festival] taking place between March 22nd and 23rd. Consider this a sort-of draft, an experimental first version, a test on what might work and what doesn't.
Currently, the basics are up and running on the CGHMN Proxmox hypervisor living in the [https://devhack.net/ /dev/hack Hackerspace] in Seattle. These include a router and Wireguard endpoint through an OPNsense VM, a VXLAN tunnel endpoint container with some custom scripts to make deploying new member tunnel easier and two containers running a basic authoritative BIND DNS server for <code>.cghmn</code> and <code>.retro</code> and one hosting a custom, internal Certificate Authority for those domains.
=== Network Layout ===
This section describes the network layout currently set up for the CGHMN demo network, none of which is necessarily permanent and already set in stone. I (Snep) made some assumptions about domain names, IP addresses, firewall rules and general design ideas to get something up and running for the computer festival based on info from the many chats and discussions on the Cursed Silicon Discord's CGHMN channel (See [[Signup]] for more details). So, please feel free to give input on things you'd like to see changed or added!
On the Proxmox host, all VLANs mentioned below are available tagged on the bridge <code>brcghmn</code>, with exception of VLAN1, which is untagged and the default network when a new container or VM is added to this bridge.
For servers and retro clients, the subnet <code>172.23.0.0/16</code> is currently in place, divided into smaller subnets, and might be subject to change later down the line. For Wireguard clients, the <code>100.89.128.0/22</code> subnet out of the CGNAT block is used and again, might change later.
Below is a further breakdown of VLANs existing in this CGHMN demo network:
==== VLAN 1 - The Global LAN (172.23.0.0/22) ====
This network is our layer 2 bridged network to all members who wish to participate and is intended to be used for retro computers to directly communicate with each other even across the globe. This is accomplished by spanning a VXLAN tunnel across a Wireguard connection from the CGHMN server infrastructure to each members' router endpoint, which can be any OpenWRT compatible device that contains the packages for VXLANs and Wireguard. The idea is to bridge on of at least two available interfaces from said router to the VXLAN network and thus directly bridge any connected retro machines to VLAN1. All members will be in the same L2 broadcast domain, meaning even non-IP protocols that are able to run over Ethernet should be able to communicate with each other from all over the world.
Machines on this network are able to connect to all hosts on the Server VLAN (see below), the firewall for DNS, NTP and ICMP queries and to the root DNS and CA servers for DNS queries and HTTP access to the CA web server. They are not, however, able to communicate with any hosts on the internet, the /dev/hack network or any of the other existing VLANs aside from specific exceptions.
Addresses are handed out via DHCP by the router in the range <code>172.23.1.1-172.23.3.254</code>, the range <code>172.23.1.11-172.23.1.255</code> is reserved for static hosts. The search domain for this network is <code>clients.retro</code>.
==== VLAN 4 - Core Services (172.23.4.0/22) ====
This VLAN in intended for core internal services, like the root DNS server, VXLAN endpoint and our custom Certificate Authority. The Proxmox host also has an IP address in this subnet (<code>172.23.4.11</code>), it does not however have any routes to the rest of this CGHMN demo infrastructure and thus can only be accessed from clients in the Core Services subnet.
Hosts in this subnet may currently access the internet, the router for DNS, NTP and ICMP queries and the VXLAN endpoint may send UDP datagrams to anyone at port <code>4789</code> for VXLAN tunnel replies, any other internal connections are prohibited.
Addresses are handed out via DHCP by the router in the range <code>172.23.7.1-172.23.7.254</code>, the range <code>172.23.4.11-172.23.6.255</code> is reserved for static hosts. The search domain for this network is <code>core.cghmn</code>.
==== VLAN 8 - Servers (172.23.8.0/22) ====
This VLAN will contain all servers hosted and managed by members, which can be any (retro) service that works across an IP router. For anything that requires direct layer 2 access or the same broadcast domain as the client machines, it is advised to host said server in the Global LAN network. This is the only VLAN clients from the bridged Global LAN network may access freely, so members should be wary about what ports they open up for anyone outside of localhost. Another option is to run a tiny router instance based on OpenWRT in front of your server which will act as a basic firewall and NAT router behind which one can run their servers.
Hosts in this subnet may not access the internet inherently, however a firewall rule is in place that allows specific servers internet access, it is still uncertain if this will make it to the final CGHMN or if this subnet is also supposed to be entirely sealed off from the public internet. During a few talks on the Discord server, the idea of hosting local package mirrors of popular distros and projects was mentioned so that both modern and retro systems won't need to connect to internet servers for package installations and upgrades. Hosts may access the router for DNS, NTP and ICMP queries, other internal connections are prohibited.
Addresses are handed out via DHCP by the router in the range <code>172.23.11.1-172.23.11.254</code>, the range <code>172.23.8.11-172.23.10.255</code> is reserved for static hosts. The search domain for this network is <code>hosting.retro</code>.
==== VLAN 12 - DMZ (172.23.12.0/22) ====
Currently not in use.
=== Containers and VMs ===
Containers and VMs on the Proxmox host are currently assigned in the 10000 ID range to keep clear of existing VMs.
There is one VM and three containers at the time of writing this:
==== VM 10001 (demo-chhmn-router) ====
This is the OPNsense VM running as the primary router, firewall, DHCP server and Wireguard endpoint for the demo network. Its login credentials are currently in the paws of Snep, as I'm still unsure where any passwords for the CGHMN are going to be stored safely and with proper access rights.
The router has the first IP in any of the available demo network subnets and responds to IPv4 and IPv4 ICMP packets, DNS queries to its local Unbound resolver and NTP sync requests to the built-in NTP server.
Unbound currently resolves all requests it cannot resolve locally recursively against the internet root servers and returns those replies to clients, this may be subject to change as we potentially plan on sealing the network off more. It is configured to forward all requests with a TLD of <code>.cghmn</code> and <code>.retro</code> to the internal DNS root server.
The Wireguard endpoint servers as the connection into the CGHMN from the outside internet on <code>66.170.190.194:42070</code> for anyone that wishes to parttake the network. See [[Signup]] for more details on how to join.
==== Container 10401 (demo-cghmn-root-dns, VLAN4, 172.23.4.101) ====
This container, based on the absolutely tiny-footprinted Alpine image, hosts the BIND-based root DNS server for the internal CGHMN domains <code>.retro</code> and <code>.cghmn</code> together with the reverse DNS zone for the 172.23.0.0 network. It lives in the Core Services subnet and is reachable on port 53 for DNS queries from every other internal subnet. Zones are configured in the zone files under <code>/etc/bind/zones</code> and loaded by the zone blocks in the <code>/etc/named.conf</code> file.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10401</code> on the Proxmox host console.
==== Container 10402 (demo-cghmn-ca, VLAN4, 172.23.4.102) ====
This container, also based on Alpine, is hosting the custom Certificate Authority based on OpenSSL created and self-signed certificate files. It is currently constructed in a Root CA -> Intermediate CA -> Server Certificates structure, where the CA signed certificates of the intermediate CA, which then signs all certificates requested for servers and clients on the network. Clients thus should only need to install the CA certificate into their trusted keychain to have valid TLS connections to servers using certificates signed by this internal CA.
Clients can access a web server on <code>certs.cghmn:80</code> or <code>172.23.4.102:80</code> via plain HTTP to download the root CA and intermediate CA certificate files for installation on their retro machines. Note: This is not meant to be secure. When you add this root CA, we could pretend to be any server on the internet under any domain and any system that has the root CA or intermediate CA certificate installed will trust it. Don't add this on machines you would have personal data on or that you would let onto the public internet!
The /root directory of this container contains a script called <code>create-and-sign-server-csr.sh</code> that, when run without any arguments, will ask a few questions on the command line and generate a signed TLS certificate in the root directory for the specified DNS names to make deployment of new TLS certificates a little easier. This requires the password of the private key of the intermediate CA, which again is currently stored in Sneps password manager but of course will be copied to a safe location to store passwords once available for the CGHMN.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10401</code> on the Proxmox host console.
==== Container 10403 (demo-cghmn-vxlan-endpoint, VLAN4, 172.23.4.103) ====
This container, another Alpine instance, connects all the VXLAN clients together under one virtual Linux bridge and is constructed with a couple if-up/if-down scripts and a Bash script to create new tunnels at <code>/opt/vxlan-scripts/create-vxlan-interface.sh</code>.
This script, when called like for example so: <code>create-vxlan-interface.sh 100.89.128.90</code> will do the following:
# Find the first unused VXLAN ID
# Output the VXLAN ID for configuring a new VXLAN tunnel on the client side
# Add an interface configuration to <code>/etc/vxlan-interfaces/</code> which is sourced by ifupdown
# Bring up that new VXLAN interface, which bridges it to the Global LAN bridge
after which the client with IP 100.89.128.90 can connect a VXLAN tunnel with the newly added VXLAN ID to their router and join the network.
This is still a very manual process, though one which will probably become more streamlined in the future of the CGHMN network, perhaps with some APIs and/or custom OpenWRT web interface *wink wink*.
This container is only reachable by the firewall itself and by the clients connecting their VXLAN bridge to port 4789 from the Wireguard tunnel, as it doesn't do any routing or hosting of services directly aside from the VXLAN endpoint.
=== Proposed Organization of IDs and IPs ===
My (Sneps) idea behind Proxmox container and VM IDs are as follows:
'''101xx - 103xx''' are for Containers and VMs in the bridged layer 2 network, so any hosts that members want to run in the bridged network directly.
'''104xx - 107xx''' are for Containers and VMs in the Core Services VLAN4, so anything that is necessary for the operation of the CGHMN network.
'''108xx - 111xx''' are for Containers and VMs in the Servers VLAN8, so anything that members would choose to host on the CGHMN Proxmox.
For IPs, I left the first 10 IPs in each subnet reserved for things like routers, for example (perhaps a second router and a virtual IP for failover down the line?).
After that, the first half of the subnet (see above under Network Layout for the actual start and end of this range) is supposed to be reserved for any hosts that are set up with a fully static IP. This is entirely outside of the DHCP range to avoid any conflicts. That DHCP range then starts with the second half of the subnet and goes up to the last available host IP of each subnet.
=== Other Notes ===
* Currently, the advertised DNS server via DHCP is the included Unbound Server on the OPNsense instance. If we want to completely seal off clients and servers from the rest of the internet, we could directly point the clients towards our root DNS server for all requests.
* Currently, the OPNsense router does DHCP as it already has an IP in each VLAN and comes with a solid DHCP server that can also support failover out of the box (ISC DHCP). I (Snep) chose this route over a standalone DHCP server to avoid having a second container/VM in each subnet that solely does DHCP or DHCP proxying, mainly to keep the setup and maintenance work as low as possible.
* A customized OpenWRT image for the Gl.iNet MT300n and AR300n are currently being built and tested, which includes required packages and UCI configurations out of the box to make joining the network perhaps a little bit easier. Will update this page or create a new one and link to it once a working image exists!
d7c9d1f31cc5038d6c4b94d0ab2b1c94a415d351
126
125
2025-03-20T03:51:24Z
Snep
5
Added reserved IP for WIREGUARD-EXTERNAL for CursedSilicon
wikitext
text/x-wiki
=== Demo Network for the Interim Computer Festival ===
This page documents the quickly set up demo network to show off the CGHMN network at the [https://sdf.org/icf/ SDF's Interim Computer Festival] taking place between March 22nd and 23rd. Consider this a sort-of draft, an experimental first version, a test on what might work and what doesn't.
Currently, the basics are up and running on the CGHMN Proxmox hypervisor living in the [https://devhack.net/ /dev/hack Hackerspace] in Seattle. These include a router and Wireguard endpoint through an OPNsense VM, a VXLAN tunnel endpoint container with some custom scripts to make deploying new member tunnel easier and two containers running a basic authoritative BIND DNS server for <code>.cghmn</code> and <code>.retro</code> and one hosting a custom, internal Certificate Authority for those domains.
=== Network Layout ===
This section describes the network layout currently set up for the CGHMN demo network, none of which is necessarily permanent and already set in stone. I (Snep) made some assumptions about domain names, IP addresses, firewall rules and general design ideas to get something up and running for the computer festival based on info from the many chats and discussions on the Cursed Silicon Discord's CGHMN channel (See [[Signup]] for more details). So, please feel free to give input on things you'd like to see changed or added!
On the Proxmox host, all VLANs mentioned below are available tagged on the bridge <code>brcghmn</code>, with exception of VLAN1, which is untagged and the default network when a new container or VM is added to this bridge.
For servers and retro clients, the subnet <code>172.23.0.0/16</code> is currently in place, divided into smaller subnets, and might be subject to change later down the line. For Wireguard clients, the <code>100.89.128.0/22</code> subnet out of the CGNAT block is used and again, might change later.
Below is a further breakdown of VLANs existing in this CGHMN demo network:
==== VLAN 1 - The Global LAN (172.23.0.0/22) ====
This network is our layer 2 bridged network to all members who wish to participate and is intended to be used for retro computers to directly communicate with each other even across the globe. This is accomplished by spanning a VXLAN tunnel across a Wireguard connection from the CGHMN server infrastructure to each members' router endpoint, which can be any OpenWRT compatible device that contains the packages for VXLANs and Wireguard. The idea is to bridge on of at least two available interfaces from said router to the VXLAN network and thus directly bridge any connected retro machines to VLAN1. All members will be in the same L2 broadcast domain, meaning even non-IP protocols that are able to run over Ethernet should be able to communicate with each other from all over the world.
Machines on this network are able to connect to all hosts on the Server VLAN (see below), the firewall for DNS, NTP and ICMP queries and to the root DNS and CA servers for DNS queries and HTTP access to the CA web server. They are not, however, able to communicate with any hosts on the internet, the /dev/hack network or any of the other existing VLANs aside from specific exceptions.
Addresses are handed out via DHCP by the router in the range <code>172.23.1.1-172.23.3.254</code>, the range <code>172.23.1.11-172.23.1.255</code> is reserved for static hosts. The search domain for this network is <code>clients.retro</code>.
==== VLAN 4 - Core Services (172.23.4.0/22) ====
This VLAN in intended for core internal services, like the root DNS server, VXLAN endpoint and our custom Certificate Authority. The Proxmox host also has an IP address in this subnet (<code>172.23.4.11</code>), it does not however have any routes to the rest of this CGHMN demo infrastructure and thus can only be accessed from clients in the Core Services subnet.
Hosts in this subnet may currently access the internet, the router for DNS, NTP and ICMP queries and the VXLAN endpoint may send UDP datagrams to anyone at port <code>4789</code> for VXLAN tunnel replies, any other internal connections are prohibited.
Addresses are handed out via DHCP by the router in the range <code>172.23.7.1-172.23.7.254</code>, the range <code>172.23.4.11-172.23.6.255</code> is reserved for static hosts. The search domain for this network is <code>core.cghmn</code>.
==== VLAN 8 - Servers (172.23.8.0/22) ====
This VLAN will contain all servers hosted and managed by members, which can be any (retro) service that works across an IP router. For anything that requires direct layer 2 access or the same broadcast domain as the client machines, it is advised to host said server in the Global LAN network. This is the only VLAN clients from the bridged Global LAN network may access freely, so members should be wary about what ports they open up for anyone outside of localhost. Another option is to run a tiny router instance based on OpenWRT in front of your server which will act as a basic firewall and NAT router behind which one can run their servers.
Hosts in this subnet may not access the internet inherently, however a firewall rule is in place that allows specific servers internet access, it is still uncertain if this will make it to the final CGHMN or if this subnet is also supposed to be entirely sealed off from the public internet. During a few talks on the Discord server, the idea of hosting local package mirrors of popular distros and projects was mentioned so that both modern and retro systems won't need to connect to internet servers for package installations and upgrades. Hosts may access the router for DNS, NTP and ICMP queries, other internal connections are prohibited.
Addresses are handed out via DHCP by the router in the range <code>172.23.11.1-172.23.11.254</code>, the range <code>172.23.8.11-172.23.10.255</code> is reserved for static hosts. The search domain for this network is <code>hosting.retro</code>.
==== VLAN 12 - DMZ (172.23.12.0/22) ====
Currently not in use.
=== Containers and VMs ===
Containers and VMs on the Proxmox host are currently assigned in the 10000 ID range to keep clear of existing VMs.
There is one VM and three containers at the time of writing this:
==== VM 10001 (demo-chhmn-router) ====
This is the OPNsense VM running as the primary router, firewall, DHCP server and Wireguard endpoint for the demo network. Its login credentials are currently in the paws of Snep, as I'm still unsure where any passwords for the CGHMN are going to be stored safely and with proper access rights.
The router has the first IP in any of the available demo network subnets and responds to IPv4 and IPv4 ICMP packets, DNS queries to its local Unbound resolver and NTP sync requests to the built-in NTP server.
Unbound currently resolves all requests it cannot resolve locally recursively against the internet root servers and returns those replies to clients, this may be subject to change as we potentially plan on sealing the network off more. It is configured to forward all requests with a TLD of <code>.cghmn</code> and <code>.retro</code> to the internal DNS root server.
The Wireguard endpoint servers as the connection into the CGHMN from the outside internet on <code>66.170.190.194:42070</code> for anyone that wishes to parttake the network. See [[Signup]] for more details on how to join.
==== Container 10401 (demo-cghmn-root-dns, VLAN4, 172.23.4.101) ====
This container, based on the absolutely tiny-footprinted Alpine image, hosts the BIND-based root DNS server for the internal CGHMN domains <code>.retro</code> and <code>.cghmn</code> together with the reverse DNS zone for the 172.23.0.0 network. It lives in the Core Services subnet and is reachable on port 53 for DNS queries from every other internal subnet. Zones are configured in the zone files under <code>/etc/bind/zones</code> and loaded by the zone blocks in the <code>/etc/named.conf</code> file.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10401</code> on the Proxmox host console.
==== Container 10402 (demo-cghmn-ca, VLAN4, 172.23.4.102) ====
This container, also based on Alpine, is hosting the custom Certificate Authority based on OpenSSL created and self-signed certificate files. It is currently constructed in a Root CA -> Intermediate CA -> Server Certificates structure, where the CA signed certificates of the intermediate CA, which then signs all certificates requested for servers and clients on the network. Clients thus should only need to install the CA certificate into their trusted keychain to have valid TLS connections to servers using certificates signed by this internal CA.
Clients can access a web server on <code>certs.cghmn:80</code> or <code>172.23.4.102:80</code> via plain HTTP to download the root CA and intermediate CA certificate files for installation on their retro machines. Note: This is not meant to be secure. When you add this root CA, we could pretend to be any server on the internet under any domain and any system that has the root CA or intermediate CA certificate installed will trust it. Don't add this on machines you would have personal data on or that you would let onto the public internet!
The /root directory of this container contains a script called <code>create-and-sign-server-csr.sh</code> that, when run without any arguments, will ask a few questions on the command line and generate a signed TLS certificate in the root directory for the specified DNS names to make deployment of new TLS certificates a little easier. This requires the password of the private key of the intermediate CA, which again is currently stored in Sneps password manager but of course will be copied to a safe location to store passwords once available for the CGHMN.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10401</code> on the Proxmox host console.
==== Container 10403 (demo-cghmn-vxlan-endpoint, VLAN4, 172.23.4.103) ====
This container, another Alpine instance, connects all the VXLAN clients together under one virtual Linux bridge and is constructed with a couple if-up/if-down scripts and a Bash script to create new tunnels at <code>/opt/vxlan-scripts/create-vxlan-interface.sh</code>.
This script, when called like for example so: <code>create-vxlan-interface.sh 100.89.128.90</code> will do the following:
# Find the first unused VXLAN ID
# Output the VXLAN ID for configuring a new VXLAN tunnel on the client side
# Add an interface configuration to <code>/etc/vxlan-interfaces/</code> which is sourced by ifupdown
# Bring up that new VXLAN interface, which bridges it to the Global LAN bridge
after which the client with IP 100.89.128.90 can connect a VXLAN tunnel with the newly added VXLAN ID to their router and join the network.
This is still a very manual process, though one which will probably become more streamlined in the future of the CGHMN network, perhaps with some APIs and/or custom OpenWRT web interface *wink wink*.
This container is only reachable by the firewall itself and by the clients connecting their VXLAN bridge to port 4789 from the Wireguard tunnel, as it doesn't do any routing or hosting of services directly aside from the VXLAN endpoint.
=== Proposed Organization of IDs and IPs ===
My (Sneps) idea behind Proxmox container and VM IDs are as follows:
'''101xx - 103xx''' are for Containers and VMs in the bridged layer 2 network, so any hosts that members want to run in the bridged network directly.
'''104xx - 107xx''' are for Containers and VMs in the Core Services VLAN4, so anything that is necessary for the operation of the CGHMN network.
'''108xx - 111xx''' are for Containers and VMs in the Servers VLAN8, so anything that members would choose to host on the CGHMN Proxmox.
For IPs, I left the first 10 IPs in each subnet reserved for things like routers, for example (perhaps a second router and a virtual IP for failover down the line?).
After that, the first half of the subnet (see above under Network Layout for the actual start and end of this range) is supposed to be reserved for any hosts that are set up with a fully static IP. This is entirely outside of the DHCP range to avoid any conflicts. That DHCP range then starts with the second half of the subnet and goes up to the last available host IP of each subnet.
=== Other Notes ===
* Currently, the advertised DNS server via DHCP is the included Unbound Server on the OPNsense instance. If we want to completely seal off clients and servers from the rest of the internet, we could directly point the clients towards our root DNS server for all requests.
* Currently, the OPNsense router does DHCP as it already has an IP in each VLAN and comes with a solid DHCP server that can also support failover out of the box (ISC DHCP). I (Snep) chose this route over a standalone DHCP server to avoid having a second container/VM in each subnet that solely does DHCP or DHCP proxying, mainly to keep the setup and maintenance work as low as possible.
* A customized OpenWRT image for the Gl.iNet MT300n and AR300n are currently being built and tested, which includes required packages and UCI configurations out of the box to make joining the network perhaps a little bit easier. Will update this page or create a new one and link to it once a working image exists!
=== Reserved static IPs ===
* '''VLAN1, 172.23.0.11:''' WIREGUARD-EXTERNAL (CursedSilicon)
ff650940efb12e3ffde9f21a8934dd7b61449b47
127
126
2025-03-20T04:49:19Z
Snep
5
added information about the container 10404
wikitext
text/x-wiki
=== Demo Network for the Interim Computer Festival ===
This page documents the quickly set up demo network to show off the CGHMN network at the [https://sdf.org/icf/ SDF's Interim Computer Festival] taking place between March 22nd and 23rd. Consider this a sort-of draft, an experimental first version, a test on what might work and what doesn't.
Currently, the basics are up and running on the CGHMN Proxmox hypervisor living in the [https://devhack.net/ /dev/hack Hackerspace] in Seattle. These include a router and Wireguard endpoint through an OPNsense VM, a VXLAN tunnel endpoint container with some custom scripts to make deploying new member tunnel easier and two containers running a basic authoritative BIND DNS server for <code>.cghmn</code> and <code>.retro</code> and one hosting a custom, internal Certificate Authority for those domains.
=== Network Layout ===
This section describes the network layout currently set up for the CGHMN demo network, none of which is necessarily permanent and already set in stone. I (Snep) made some assumptions about domain names, IP addresses, firewall rules and general design ideas to get something up and running for the computer festival based on info from the many chats and discussions on the Cursed Silicon Discord's CGHMN channel (See [[Signup]] for more details). So, please feel free to give input on things you'd like to see changed or added!
On the Proxmox host, all VLANs mentioned below are available tagged on the bridge <code>brcghmn</code>, with exception of VLAN1, which is untagged and the default network when a new container or VM is added to this bridge.
For servers and retro clients, the subnet <code>172.23.0.0/16</code> is currently in place, divided into smaller subnets, and might be subject to change later down the line. For Wireguard clients, the <code>100.89.128.0/22</code> subnet out of the CGNAT block is used and again, might change later.
Below is a further breakdown of VLANs existing in this CGHMN demo network:
==== VLAN 1 - The Global LAN (172.23.0.0/22) ====
This network is our layer 2 bridged network to all members who wish to participate and is intended to be used for retro computers to directly communicate with each other even across the globe. This is accomplished by spanning a VXLAN tunnel across a Wireguard connection from the CGHMN server infrastructure to each members' router endpoint, which can be any OpenWRT compatible device that contains the packages for VXLANs and Wireguard. The idea is to bridge on of at least two available interfaces from said router to the VXLAN network and thus directly bridge any connected retro machines to VLAN1. All members will be in the same L2 broadcast domain, meaning even non-IP protocols that are able to run over Ethernet should be able to communicate with each other from all over the world.
Machines on this network are able to connect to all hosts on the Server VLAN (see below), the firewall for DNS, NTP and ICMP queries and to the root DNS and CA servers for DNS queries and HTTP access to the CA web server. They may also query DNS lookups at the legacy DNS server at <code>172.23.0.104</code>. They are not, however, able to communicate with any hosts on the internet, the /dev/hack network or any of the other existing VLANs aside from specific exceptions.
Addresses are handed out via DHCP by the router in the range <code>172.23.1.1-172.23.3.254</code>, the range <code>172.23.1.11-172.23.1.255</code> is reserved for static hosts. The search domain for this network is <code>clients.retro</code>.
==== VLAN 4 - Core Services (172.23.4.0/22) ====
This VLAN in intended for core internal services, like the root DNS server, VXLAN endpoint and our custom Certificate Authority. The Proxmox host also has an IP address in this subnet (<code>172.23.4.11</code>), it does not however have any routes to the rest of this CGHMN demo infrastructure and thus can only be accessed from clients in the Core Services subnet.
Hosts in this subnet may currently access the internet, the router for DNS, NTP and ICMP queries, query DNS lookups at the legacy DNS server at <code>172.23.4.104</code> and the VXLAN endpoint may send UDP datagrams to anyone at port <code>4789</code> for VXLAN tunnel replies, any other internal connections are prohibited.
Addresses are handed out via DHCP by the router in the range <code>172.23.7.1-172.23.7.254</code>, the range <code>172.23.4.11-172.23.6.255</code> is reserved for static hosts. The search domain for this network is <code>core.cghmn</code>.
==== VLAN 8 - Servers (172.23.8.0/22) ====
This VLAN will contain all servers hosted and managed by members, which can be any (retro) service that works across an IP router. For anything that requires direct layer 2 access or the same broadcast domain as the client machines, it is advised to host said server in the Global LAN network. This is the only VLAN clients from the bridged Global LAN network may access freely, so members should be wary about what ports they open up for anyone outside of localhost. Another option is to run a tiny router instance based on OpenWRT in front of your server which will act as a basic firewall and NAT router behind which one can run their servers.
Hosts in this subnet may not access the internet inherently, however a firewall rule is in place that allows specific servers internet access, it is still uncertain if this will make it to the final CGHMN or if this subnet is also supposed to be entirely sealed off from the public internet. During a few chats on the Discord server, the idea of hosting local package mirrors of popular distros and projects was mentioned so that both modern and retro systems won't need to connect to internet servers for package installations and upgrades. Hosts may access the router for DNS, NTP and ICMP queries and query DNS lookups at the legacy DNS server at <code>172.23.4.104</code>, other internal connections are prohibited.
Addresses are handed out via DHCP by the router in the range <code>172.23.11.1-172.23.11.254</code>, the range <code>172.23.8.11-172.23.10.255</code> is reserved for static hosts. The search domain for this network is <code>hosting.retro</code>.
==== VLAN 12 - DMZ (172.23.12.0/22) ====
Currently not in use.
=== Containers and VMs ===
Containers and VMs on the Proxmox host are currently assigned in the 10000 ID range to keep clear of existing VMs.
There is one VM and three containers at the time of writing this:
==== VM 10001 (demo-chhmn-router) ====
This is the OPNsense VM running as the primary router, firewall, DHCP server and Wireguard endpoint for the demo network. Its login credentials are currently in the paws of Snep, as I'm still unsure where any passwords for the CGHMN are going to be stored safely and with proper access rights.
The router has the first IP in any of the available demo network subnets and responds to IPv4 and IPv4 ICMP packets, DNS queries to its local Unbound resolver and NTP sync requests to the built-in NTP server.
Unbound currently resolves all requests it cannot resolve locally recursively against the internet root servers and returns those replies to clients, this may be subject to change as we potentially plan on sealing the network off more. It is configured to forward all requests with a TLD of <code>.cghmn</code> and <code>.retro</code> to the internal DNS root server.
The Wireguard endpoint servers as the connection into the CGHMN from the outside internet on <code>66.170.190.194:42070</code> for anyone that wishes to parttake the network. See [[Signup]] for more details on how to join.
==== Container 10401 (demo-cghmn-root-dns, VLAN4, 172.23.4.101) ====
This container, based on the absolutely tiny-footprinted Alpine image, hosts the BIND-based root DNS server for the internal CGHMN domains <code>.retro</code> and <code>.cghmn</code> together with the reverse DNS zone for the 172.23.0.0 network. It lives in the Core Services subnet and is reachable on port 53 for DNS queries from every other internal subnet. Zones are configured in the zone files under <code>/etc/bind/zones</code> and loaded by the zone blocks in the <code>/etc/named.conf</code> file.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10401</code> on the Proxmox host console.
==== Container 10402 (demo-cghmn-ca, VLAN4, 172.23.4.102) ====
This container, also based on Alpine, is hosting the custom Certificate Authority based on OpenSSL created and self-signed certificate files. It is currently constructed in a Root CA -> Intermediate CA -> Server Certificates structure, where the CA signed certificates of the intermediate CA, which then signs all certificates requested for servers and clients on the network. Clients thus should only need to install the CA certificate into their trusted keychain to have valid TLS connections to servers using certificates signed by this internal CA.
Clients can access a web server on <code>certs.cghmn:80</code> or <code>172.23.4.102:80</code> via plain HTTP to download the root CA and intermediate CA certificate files for installation on their retro machines. Note: This is not meant to be secure. When you add this root CA, we could pretend to be any server on the internet under any domain and any system that has the root CA or intermediate CA certificate installed will trust it. Don't add this on machines you would have personal data on or that you would let onto the public internet!
The /root directory of this container contains a script called <code>create-and-sign-server-csr.sh</code> that, when run without any arguments, will ask a few questions on the command line and generate a signed TLS certificate in the root directory for the specified DNS names to make deployment of new TLS certificates a little easier. This requires the password of the private key of the intermediate CA, which again is currently stored in Sneps password manager but of course will be copied to a safe location to store passwords once available for the CGHMN.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10402</code> on the Proxmox host console.
==== Container 10403 (demo-cghmn-vxlan-endpoint, VLAN4, 172.23.4.103) ====
This container, another Alpine instance, connects all the VXLAN clients together under one virtual Linux bridge and is constructed with a couple if-up/if-down scripts and a Bash script to create new tunnels at <code>/opt/vxlan-scripts/create-vxlan-interface.sh</code>.
This script, when called like for example so: <code>create-vxlan-interface.sh 100.89.128.90</code> will do the following:
# Find the first unused VXLAN ID
# Output the VXLAN ID for configuring a new VXLAN tunnel on the client side
# Add an interface configuration to <code>/etc/vxlan-interfaces/</code> which is sourced by ifupdown
# Bring up that new VXLAN interface, which bridges it to the Global LAN bridge
after which the client with IP 100.89.128.90 can connect a VXLAN tunnel with the newly added VXLAN ID to their router and join the network.
This is still a very manual process, though one which will probably become more streamlined in the future of the CGHMN network, perhaps with some APIs and/or custom OpenWRT web interface *wink wink*.
This container is only reachable by the firewall itself and by the clients connecting their VXLAN bridge to port 4789 from the Wireguard tunnel, as it doesn't do any routing or hosting of services directly aside from the VXLAN endpoint.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10403</code> on the Proxmox host onsole.
==== Container 10404 (demo-cghmn-legacy-dns, VLAN4, 172.23.4.104) ====
This container, based on Alpine, runs a dnsmasq instance configured to look up certain DNS overrides either in the hosts file at <code>/etc/cghmn-dns-overrides</code> or by including a dnsmasq configuration file from <code>/etc/dnsmasq-cghmn.d/*.conf</code>. Any other requests it cannot resolve locally are forwarded to the Unbound DNS resolver running on the OPNsense router VM. This setup is used to create DNS overrides for existing domains to make old software, which is hardcoded to specific DNS entries, work again with custom servers hosted internally.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10404</code> on the Proxmox host console.
=== Proposed Organization of IDs and IPs ===
My (Sneps) idea behind Proxmox container and VM IDs are as follows:
'''101xx - 103xx''' are for Containers and VMs in the bridged layer 2 network, so any hosts that members want to run in the bridged network directly.
'''104xx - 107xx''' are for Containers and VMs in the Core Services VLAN4, so anything that is necessary for the operation of the CGHMN network.
'''108xx - 111xx''' are for Containers and VMs in the Servers VLAN8, so anything that members would choose to host on the CGHMN Proxmox.
For IPs, I left the first 10 IPs in each subnet reserved for things like routers, for example (perhaps a second router and a virtual IP for failover down the line?).
After that, the first half of the subnet (see above under Network Layout for the actual start and end of this range) is supposed to be reserved for any hosts that are set up with a fully static IP. This is entirely outside of the DHCP range to avoid any conflicts. That DHCP range then starts with the second half of the subnet and goes up to the last available host IP of each subnet.
=== Other Notes ===
* Currently, the advertised DNS server via DHCP is the included Unbound Server on the OPNsense instance. If we want to completely seal off clients and servers from the rest of the internet, we could directly point the clients towards our root DNS server for all requests.
* Currently, the OPNsense router does DHCP as it already has an IP in each VLAN and comes with a solid DHCP server that can also support failover out of the box (ISC DHCP). I (Snep) chose this route over a standalone DHCP server to avoid having a second container/VM in each subnet that solely does DHCP or DHCP proxying, mainly to keep the setup and maintenance work as low as possible.
* A customized OpenWRT image for the Gl.iNet MT300n and AR300n are currently being built and tested, which includes required packages and UCI configurations out of the box to make joining the network perhaps a little bit easier. Will update this page or create a new one and link to it once a working image exists!
=== Reserved static IPs ===
* '''VLAN1, 172.23.0.11:''' WIREGUARD-EXTERNAL (CursedSilicon)
8e46e1ab3d899eadfec63573601bbda9968d3219
131
127
2025-03-29T20:45:49Z
Snep
5
Added paragraph about changes to the network
wikitext
text/x-wiki
=== Demo Network for the Interim Computer Festival ===
This page documents the quickly set up demo network to show off the CGHMN network at the [https://sdf.org/icf/ SDF's Interim Computer Festival] taking place between March 22nd and 23rd. Consider this a sort-of draft, an experimental first version, a test on what might work and what doesn't.
Currently, the basics are up and running on the CGHMN Proxmox hypervisor living in the [https://devhack.net/ /dev/hack Hackerspace] in Seattle. These include a router and Wireguard endpoint through an OPNsense VM, a VXLAN tunnel endpoint container with some custom scripts to make deploying new member tunnel easier and two containers running a basic authoritative BIND DNS server for <code>.cghmn</code> and <code>.retro</code> and one hosting a custom, internal Certificate Authority for those domains.
=== Changes to the network layout ===
Since this page was written, there have been quite a lot of discussions about how and what we might change going forward, after the initial test of the network at the ICF was a success. The biggest change, so far, has been the idea to move away from VXLANs to GRETAP tunnels for the Layer 2 and non-IP Layer 3 traffic. This is mostly due to the fact that VXLANs, by their RFC definition, MAY NOT fragment packets coming into the VTEP (aka. a VXLAN tunnel endpoint) and packets flowing out of a VTEP MAY be reassembled if fragmented, but don't necessarily have to. In addition to this, the IP packets generated by the VXLAN tunnels have the Don't Fragment bit set, so those packets may also not be fragmented. This means that the underlying transport of the VXLAN tunnels, here Wireguard, would have to open a path that allows 1500 byte frames through its tunnel, which would make the tunnel packets themselves quite large at ~1600 bytes, which would then be fragmented by whatever routers are in between the client router and the CGHMN router. Turns out, that's quite inefficient.
GRETAP tunnels, on the other hand, have the two flags <code>ignore-df</code> and <code>nopmtudisc</code>, which together with <code>ttl 255</code> create a tunnel over IP, which can carry ''and fragment'' 1500 byte Ethernet frames over a smaller underlying transport, still Wireguard in this case. This was a massive boost not only in speed under certain circumstances, like running this all on a small travel router with a weak MIPS CPU, but also reliability, as less dropped packets could be observed and MTU blackholes finally not happening in our testing.
To bring up a GRETAP tunnel within the network to the CGHMN central router, use the following commands on a Linux box:<blockquote><code>ip link add gretap-cghmn type gretap remote 172.23.4.103 dev wg0 ignore-df nopmtudisc ttl 255</code>
<code>ip link set gretap-cghmn master br0 mtu 1500</code>
<code>ip link set gretap-cghmn up</code></blockquote>Where <code>wg0</code> is your CGHMN Wireguard tunnel and <code>br0</code> is the bridge you'd want to bridge the GRETAP tunnel to.
However, to improve performance more and make the network a little more reliable, there was another idea for a change: Sending routable IP traffic not over the Layher 2 tunnel, but rather routing it directly through the Wireguard tunnel, which already is a straight Layer 3 path to the CGHMN core router. This is possible due to the nftables <code>bridge</code> filter table, which can match and filter packets on bridge interfaces, incuding what "bridge port" they come in and go out of. This means we can filter IP traffic from leaving the retro LAN bridge, to which you'd connect your retro machines via a phyiscal LAN port, by creating a filter that says "Block all traffic on bridge <code>br-retrolan</code> which leaves through a GRETAP interface" and "Block all traffic on bridge <code>br-retrolan</code> which comes in on a GRETAP interface". Now, you can assign the router a static IP address on the bridge, so it can talk to your retro machines, enable DHCP and NAT and route IP traffic from your machines straight to the CGHMN via Wireguard. In the future, this shall be extended to work without NAT on the client side, so that every member has a small subnet, /24 for example, which is routed to the Wireugard tunnel client IP. This also means that the VLAN1 described in the next section might not need an IP address in the future so that the VLAN1 is purely non-IP traffic at least from the CGHMN side of things.
Yet another idea mentioned was the ability to span tunnels directly between members, even without going through the CGHMN core network in the first place. This can be accomplished by creating another GRETAP interface whose <code>remote</code> IP argument points to the IP of another members router, either through the existing CGHMN Wireguard tunnel or through a separate tunnel that you span between you and the other member. This GRETAP interface is then bridged to the <code>br-retrolan</code> bridge and with a couple of (perhaps default) bridge firewall rules, you and the other member should be able to communicate directly! Of course, this also means we'd have to implement some sort of loopback protection not just on the member router side (the default bridge firewall rules mentioned in the last sentence), but also on the core router side. so this idea is not yet fully implemented for testing.
IP Allocations within the network are now kept track of [[CGHMN-IP-Allocations|in this Wiki page]], though the IPs listed there might not be applied in the current configuration yet.
=== Network Layout ===
This section describes the network layout currently set up for the CGHMN demo network, none of which is necessarily permanent and already set in stone. I (Snep) made some assumptions about domain names, IP addresses, firewall rules and general design ideas to get something up and running for the computer festival based on info from the many chats and discussions on the Cursed Silicon Discord's CGHMN channel (See [[Signup]] for more details). So, please feel free to give input on things you'd like to see changed or added!
On the Proxmox host, all VLANs mentioned below are available tagged on the bridge <code>brcghmn</code>, with exception of VLAN1, which is untagged and the default network when a new container or VM is added to this bridge.
For servers and retro clients, the subnet <code>172.23.0.0/16</code> is currently in place, divided into smaller subnets, and might be subject to change later down the line. For Wireguard clients, the <code>100.89.128.0/22</code> subnet out of the CGNAT block is used and again, might change later.
Below is a further breakdown of VLANs existing in this CGHMN demo network:
==== VLAN 1 - The Global LAN (172.23.0.0/22) ====
This network is our layer 2 bridged network to all members who wish to participate and is intended to be used for retro computers to directly communicate with each other even across the globe. This is accomplished by spanning a VXLAN tunnel across a Wireguard connection from the CGHMN server infrastructure to each members' router endpoint, which can be any OpenWRT compatible device that contains the packages for VXLANs and Wireguard. The idea is to bridge on of at least two available interfaces from said router to the VXLAN network and thus directly bridge any connected retro machines to VLAN1. All members will be in the same L2 broadcast domain, meaning even non-IP protocols that are able to run over Ethernet should be able to communicate with each other from all over the world.
Machines on this network are able to connect to all hosts on the Server VLAN (see below), the firewall for DNS, NTP and ICMP queries and to the root DNS and CA servers for DNS queries and HTTP access to the CA web server. They may also query DNS lookups at the legacy DNS server at <code>172.23.0.104</code>. They are not, however, able to communicate with any hosts on the internet, the /dev/hack network or any of the other existing VLANs aside from specific exceptions.
Addresses are handed out via DHCP by the router in the range <code>172.23.1.1-172.23.3.254</code>, the range <code>172.23.1.11-172.23.1.255</code> is reserved for static hosts. The search domain for this network is <code>clients.retro</code>.
==== VLAN 4 - Core Services (172.23.4.0/22) ====
This VLAN in intended for core internal services, like the root DNS server, VXLAN endpoint and our custom Certificate Authority. The Proxmox host also has an IP address in this subnet (<code>172.23.4.11</code>), it does not however have any routes to the rest of this CGHMN demo infrastructure and thus can only be accessed from clients in the Core Services subnet.
Hosts in this subnet may currently access the internet, the router for DNS, NTP and ICMP queries, query DNS lookups at the legacy DNS server at <code>172.23.4.104</code> and the VXLAN endpoint may send UDP datagrams to anyone at port <code>4789</code> for VXLAN tunnel replies, any other internal connections are prohibited.
Addresses are handed out via DHCP by the router in the range <code>172.23.7.1-172.23.7.254</code>, the range <code>172.23.4.11-172.23.6.255</code> is reserved for static hosts. The search domain for this network is <code>core.cghmn</code>.
==== VLAN 8 - Servers (172.23.8.0/22) ====
This VLAN will contain all servers hosted and managed by members, which can be any (retro) service that works across an IP router. For anything that requires direct layer 2 access or the same broadcast domain as the client machines, it is advised to host said server in the Global LAN network. This is the only VLAN clients from the bridged Global LAN network may access freely, so members should be wary about what ports they open up for anyone outside of localhost. Another option is to run a tiny router instance based on OpenWRT in front of your server which will act as a basic firewall and NAT router behind which one can run their servers.
Hosts in this subnet may not access the internet inherently, however a firewall rule is in place that allows specific servers internet access, it is still uncertain if this will make it to the final CGHMN or if this subnet is also supposed to be entirely sealed off from the public internet. During a few chats on the Discord server, the idea of hosting local package mirrors of popular distros and projects was mentioned so that both modern and retro systems won't need to connect to internet servers for package installations and upgrades. Hosts may access the router for DNS, NTP and ICMP queries and query DNS lookups at the legacy DNS server at <code>172.23.4.104</code>, other internal connections are prohibited.
Addresses are handed out via DHCP by the router in the range <code>172.23.11.1-172.23.11.254</code>, the range <code>172.23.8.11-172.23.10.255</code> is reserved for static hosts. The search domain for this network is <code>hosting.retro</code>.
==== VLAN 12 - DMZ (172.23.12.0/22) ====
Currently not in use.
=== Containers and VMs ===
Containers and VMs on the Proxmox host are currently assigned in the 10000 ID range to keep clear of existing VMs.
There is one VM and three containers at the time of writing this:
==== VM 10001 (demo-chhmn-router) ====
This is the OPNsense VM running as the primary router, firewall, DHCP server and Wireguard endpoint for the demo network. Its login credentials are currently in the paws of Snep, as I'm still unsure where any passwords for the CGHMN are going to be stored safely and with proper access rights.
The router has the first IP in any of the available demo network subnets and responds to IPv4 and IPv4 ICMP packets, DNS queries to its local Unbound resolver and NTP sync requests to the built-in NTP server.
Unbound currently resolves all requests it cannot resolve locally recursively against the internet root servers and returns those replies to clients, this may be subject to change as we potentially plan on sealing the network off more. It is configured to forward all requests with a TLD of <code>.cghmn</code> and <code>.retro</code> to the internal DNS root server.
The Wireguard endpoint servers as the connection into the CGHMN from the outside internet on <code>66.170.190.194:42070</code> for anyone that wishes to parttake the network. See [[Signup]] for more details on how to join.
==== Container 10401 (demo-cghmn-root-dns, VLAN4, 172.23.4.101) ====
This container, based on the absolutely tiny-footprinted Alpine image, hosts the BIND-based root DNS server for the internal CGHMN domains <code>.retro</code> and <code>.cghmn</code> together with the reverse DNS zone for the 172.23.0.0 network. It lives in the Core Services subnet and is reachable on port 53 for DNS queries from every other internal subnet. Zones are configured in the zone files under <code>/etc/bind/zones</code> and loaded by the zone blocks in the <code>/etc/named.conf</code> file.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10401</code> on the Proxmox host console.
==== Container 10402 (demo-cghmn-ca, VLAN4, 172.23.4.102) ====
This container, also based on Alpine, is hosting the custom Certificate Authority based on OpenSSL created and self-signed certificate files. It is currently constructed in a Root CA -> Intermediate CA -> Server Certificates structure, where the CA signed certificates of the intermediate CA, which then signs all certificates requested for servers and clients on the network. Clients thus should only need to install the CA certificate into their trusted keychain to have valid TLS connections to servers using certificates signed by this internal CA.
Clients can access a web server on <code>certs.cghmn:80</code> or <code>172.23.4.102:80</code> via plain HTTP to download the root CA and intermediate CA certificate files for installation on their retro machines. Note: This is not meant to be secure. When you add this root CA, we could pretend to be any server on the internet under any domain and any system that has the root CA or intermediate CA certificate installed will trust it. Don't add this on machines you would have personal data on or that you would let onto the public internet!
The /root directory of this container contains a script called <code>create-and-sign-server-csr.sh</code> that, when run without any arguments, will ask a few questions on the command line and generate a signed TLS certificate in the root directory for the specified DNS names to make deployment of new TLS certificates a little easier. This requires the password of the private key of the intermediate CA, which again is currently stored in Sneps password manager but of course will be copied to a safe location to store passwords once available for the CGHMN.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10402</code> on the Proxmox host console.
==== Container 10403 (demo-cghmn-vxlan-endpoint, VLAN4, 172.23.4.103) ====
This container, another Alpine instance, connects all the VXLAN clients together under one virtual Linux bridge and is constructed with a couple if-up/if-down scripts and a Bash script to create new tunnels at <code>/opt/vxlan-scripts/create-vxlan-interface.sh</code>.
This script, when called like for example so: <code>create-vxlan-interface.sh 100.89.128.90</code> will do the following:
# Find the first unused VXLAN ID
# Output the VXLAN ID for configuring a new VXLAN tunnel on the client side
# Add an interface configuration to <code>/etc/vxlan-interfaces/</code> which is sourced by ifupdown
# Bring up that new VXLAN interface, which bridges it to the Global LAN bridge
after which the client with IP 100.89.128.90 can connect a VXLAN tunnel with the newly added VXLAN ID to their router and join the network.
This is still a very manual process, though one which will probably become more streamlined in the future of the CGHMN network, perhaps with some APIs and/or custom OpenWRT web interface *wink wink*.
This container is only reachable by the firewall itself and by the clients connecting their VXLAN bridge to port 4789 from the Wireguard tunnel, as it doesn't do any routing or hosting of services directly aside from the VXLAN endpoint.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10403</code> on the Proxmox host onsole.
==== Container 10404 (demo-cghmn-legacy-dns, VLAN4, 172.23.4.104) ====
This container, based on Alpine, runs a dnsmasq instance configured to look up certain DNS overrides either in the hosts file at <code>/etc/cghmn-dns-overrides</code> or by including a dnsmasq configuration file from <code>/etc/dnsmasq-cghmn.d/*.conf</code>. Any other requests it cannot resolve locally are forwarded to the Unbound DNS resolver running on the OPNsense router VM. This setup is used to create DNS overrides for existing domains to make old software, which is hardcoded to specific DNS entries, work again with custom servers hosted internally.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10404</code> on the Proxmox host console.
=== Proposed Organization of IDs and IPs ===
My (Sneps) idea behind Proxmox container and VM IDs are as follows:
'''101xx - 103xx''' are for Containers and VMs in the bridged layer 2 network, so any hosts that members want to run in the bridged network directly.
'''104xx - 107xx''' are for Containers and VMs in the Core Services VLAN4, so anything that is necessary for the operation of the CGHMN network.
'''108xx - 111xx''' are for Containers and VMs in the Servers VLAN8, so anything that members would choose to host on the CGHMN Proxmox.
For IPs, I left the first 10 IPs in each subnet reserved for things like routers, for example (perhaps a second router and a virtual IP for failover down the line?).
After that, the first half of the subnet (see above under Network Layout for the actual start and end of this range) is supposed to be reserved for any hosts that are set up with a fully static IP. This is entirely outside of the DHCP range to avoid any conflicts. That DHCP range then starts with the second half of the subnet and goes up to the last available host IP of each subnet.
=== Other Notes ===
* Currently, the advertised DNS server via DHCP is the included Unbound Server on the OPNsense instance. If we want to completely seal off clients and servers from the rest of the internet, we could directly point the clients towards our root DNS server for all requests.
* Currently, the OPNsense router does DHCP as it already has an IP in each VLAN and comes with a solid DHCP server that can also support failover out of the box (ISC DHCP). I (Snep) chose this route over a standalone DHCP server to avoid having a second container/VM in each subnet that solely does DHCP or DHCP proxying, mainly to keep the setup and maintenance work as low as possible.
* A customized OpenWRT image for the Gl.iNet MT300n and AR300n are currently being built and tested, which includes required packages and UCI configurations out of the box to make joining the network perhaps a little bit easier. Will update this page or create a new one and link to it once a working image exists!
=== Reserved static IPs ===
* '''VLAN1, 172.23.0.11:''' WIREGUARD-EXTERNAL (CursedSilicon)
1431e634855e74b8418aa58b8a8b30cf471043d0
CGHMN-IP-Allocations
0
77
128
2025-03-23T06:23:00Z
Snep
5
Initial page creation
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Global LAN
|1
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Tunnel IP
!VXLAN ID
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|100.89.128.1
|1001
|100.96.1.0/24
| -
|-
|Talija
|100.89.128.2
|1002
|100.96.2.0/24
| -
|-
|Snep
|100.89.128.3
|1003
|100.96.3.0/24
| -
|}
24cf515e878e030ac4379e05d16039e20ac3abcd
129
128
2025-03-23T06:35:59Z
Snep
5
Changed VLAN1 to VLAN12
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|12
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Tunnel IP
!VXLAN ID
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|100.89.128.1
|1001
|100.96.1.0/24
| -
|-
|Talija
|100.89.128.2
|1002
|100.96.2.0/24
| -
|-
|Snep
|100.89.128.3
|1003
|100.96.3.0/24
| -
|}
2435f4fa83875ba4f966c726984a26d335316733
130
129
2025-03-23T06:43:21Z
Snep
5
Changed VLAN12 to VLAN256
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Tunnel IP
!VXLAN ID
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|100.89.128.1
|1001
|100.96.1.0/24
| -
|-
|Talija
|100.89.128.2
|1002
|100.96.2.0/24
| -
|-
|Snep
|100.89.128.3
|1003
|100.96.3.0/24
| -
|}
d35e2b155db1a8a0d3d6f16240ae8a20c0c89077
132
130
2025-03-29T21:13:37Z
Snep
5
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|PC tunnel
|100.89.128.3
|100.96.3.0/24
| -
|}
eba9f601b0c2fa4012d22fbe4f603d081f560a21
133
132
2025-03-29T21:15:01Z
Snep
5
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|MT300n Router
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|}
4a0dd4545d1f125f92808baecf7fee1a07f619ed
134
133
2025-03-30T05:09:30Z
Snep
5
Added list entries for delegated domains and member servers on the CGHMN Proxmox
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|MT300n Router
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
6f9cacaf3501f301329383026eb249a55023b4d7
155
134
2025-05-05T22:26:20Z
Snep
5
Added hadn69 and lily
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|MT300n Router
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| -
|100.89.128.6
|100.96.6.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
06e8e61b1d3cee0859dd82898310a217934fddc7
157
155
2025-05-06T21:39:25Z
Snep
5
Added theothertom to members list
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|MT300n Router
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| -
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
8ef76ffd4d4f1e3fcd5c1e3b61a600544e1fcc0f
CGHMN-Router-Configuration
0
78
135
2025-04-02T08:24:45Z
Snep
5
Created page with "Example Script to join a Linux box to the network as a router: <code>#!/bin/bash # Replace the values below with the ones you got from us when joining # and/or with values that match your setup WG_CONFIG_PATH=/etc/wireguard/wg-cghmn.conf WG_TUNNEL_IP=100.89.128.1 BRIDGED_LAN_INTERFACE=eth1 BRIDGED_LAN_IP=100.96.1.1 BRIDGED_LAN_DHCP_START=100.96.1.100 BRIDGED_LAN_DHCP_END=100.96.1.200 # Bring up Wireguard tunnel ip link add wg-cghmn type wireguard wg setconf wg-cghnm..."
wikitext
text/x-wiki
Example Script to join a Linux box to the network as a router:
<code>#!/bin/bash
# Replace the values below with the ones you got from us when joining
# and/or with values that match your setup
WG_CONFIG_PATH=/etc/wireguard/wg-cghmn.conf
WG_TUNNEL_IP=100.89.128.1
BRIDGED_LAN_INTERFACE=eth1
BRIDGED_LAN_IP=100.96.1.1
BRIDGED_LAN_DHCP_START=100.96.1.100
BRIDGED_LAN_DHCP_END=100.96.1.200
# Bring up Wireguard tunnel
ip link add wg-cghmn type wireguard
wg setconf wg-cghnm "${WG_CONFIG_PATH}"
ip addr add "${WG_TUNNEL_IP}/22" dev wg-cghmn
ip link set wg-cghmn up
# Add necessary routes to Wireguard interface
ip route add 100.89.128.0/22 dev wg-cghmn
ip route add 172.23.0.0/16 dev wg-cghmn
ip route add 100.96.0.0/13 dev wg-cghmn
# Enable IP forwarding
sysctl -w net.ipv4.ip_forward=1
# Create bridge and add "LAN"-side interface
ip link add br-cghmn type bridge
ip link set br-cghmn up
ip addr flush "${BRIDGED_LAN_INTERFACE}"
ip link set "${BRIDGED_LAN_INTERFACE}" master br-cghmn
# Add "LAN"-side IP address to bridge
ip addr add "${BRIDGED_LAN_IP}/24" dev br-cghmn
# Add nftables rules to prevent IP traffic from leaving the bridge
nft add table bridge filter
nft add chain bridge filter forward '{ type filter hook forward priority 0; }'
nft add rule bridge forward 'oifname gretap* meta ibrname meta nfproto ipv4 br-cghmn drop comment "Drop IPv4 from leaving the bridge"'
nft add rule bridge forward 'iifname gretap* meta ibrname meta nfproto ipv4 br-cghmn drop comment "Drop IPv4 from entering the bridge"'
nft add rule bridge forward 'oifname gretap* meta ibrname meta nfproto ipv6 br-cghmn drop comment "Drop IPv6 from leaving the bridge"'
nft add rule bridge forward 'iifname gretap* meta ibrname meta nfproto ipv6 br-cghmn drop comment "Drop IPv6 from entering the bridge"'
# Create GRETAP interface and add to bridge
ip link add gretap-cghmn type gretap remote 172.23.4.103 ignore-df nopmtudisc ttl 255
ip link set gretap-cghmn master br-cghmn mtu 1500
ip link set br-cghmn mtu 1500
ip link set gretap-cghmn up
# Start dnsmasq as DHCP server
dnsmasq -d -R -P 80 \
-i "${BRIDGED_LAN_INTERFACE}" \
-S 100.89.128.0 \
-F "${BRIDGED_LAN_DHCP_START},${BRIDGED_LAN_DHCP_END}"</code>
85dc7ebfd01c18a4729ccc497c2e2f120cae1f36
136
135
2025-04-02T08:25:45Z
Snep
5
wikitext
text/x-wiki
Example Script to join a Linux box to the network as a router:
<code>#!/bin/bash</code>
<code># Replace the values below with the ones you got from us when joining</code>
<code># and/or with values that match your setup</code>
<code>WG_CONFIG_PATH=/etc/wireguard/wg-cghmn.conf</code>
<code>WG_TUNNEL_IP=100.89.128.1</code>
<code>BRIDGED_LAN_INTERFACE=eth1</code>
<code>BRIDGED_LAN_IP=100.96.1.1</code>
<code>BRIDGED_LAN_DHCP_START=100.96.1.100</code>
<code>BRIDGED_LAN_DHCP_END=100.96.1.200</code>
<code># Bring up Wireguard tunnel</code>
<code>ip link add wg-cghmn type wireguard</code>
<code>wg setconf wg-cghnm "${WG_CONFIG_PATH}"</code>
<code>ip addr add "${WG_TUNNEL_IP}/22" dev wg-cghmn</code>
<code>ip link set wg-cghmn up</code>
<code># Add necessary routes to Wireguard interface</code>
<code>ip route add 100.89.128.0/22 dev wg-cghmn</code>
<code>ip route add 172.23.0.0/16 dev wg-cghmn</code>
<code>ip route add 100.96.0.0/13 dev wg-cghmn</code>
<code># Enable IP forwarding</code>
<code>sysctl -w net.ipv4.ip_forward=1</code>
<code># Create bridge and add "LAN"-side interface</code>
<code>ip link add br-cghmn type bridge</code>
<code>ip link set br-cghmn up</code>
<code>ip addr flush "${BRIDGED_LAN_INTERFACE}"</code>
<code>ip link set "${BRIDGED_LAN_INTERFACE}" master br-cghmn</code>
<code># Add "LAN"-side IP address to bridge</code>
<code>ip addr add "${BRIDGED_LAN_IP}/24" dev br-cghmn</code>
<code># Add nftables rules to prevent IP traffic from leaving the bridge</code>
<code>nft add table bridge filter</code>
<code>nft add chain bridge filter forward '{ type filter hook forward priority 0; }'</code>
<code>nft add rule bridge forward 'oifname gretap* meta ibrname meta nfproto ipv4 br-cghmn drop comment "Drop IPv4 from leaving the bridge"'</code>
<code>nft add rule bridge forward 'iifname gretap* meta ibrname meta nfproto ipv4 br-cghmn drop comment "Drop IPv4 from entering the bridge"'</code>
<code>nft add rule bridge forward 'oifname gretap* meta ibrname meta nfproto ipv6 br-cghmn drop comment "Drop IPv6 from leaving the bridge"'</code>
<code>nft add rule bridge forward 'iifname gretap* meta ibrname meta nfproto ipv6 br-cghmn drop comment "Drop IPv6 from entering the bridge"'</code>
<code># Create GRETAP interface and add to bridge</code>
<code>ip link add gretap-cghmn type gretap remote 172.23.4.103 ignore-df nopmtudisc ttl 255</code>
<code>ip link set gretap-cghmn master br-cghmn mtu 1500</code>
<code>ip link set br-cghmn mtu 1500</code>
<code>ip link set gretap-cghmn up</code>
<code># Start dnsmasq as DHCP server</code>
<code>dnsmasq -d -R -P 80 \</code>
<code>Â Â -i "${BRIDGED_LAN_INTERFACE}" \</code>
<code>Â Â -S 100.89.128.0 \</code>
<code>Â Â -F "${BRIDGED_LAN_DHCP_START},${BRIDGED_LAN_DHCP_END}"</code>
51f2f831f140297237f03d417c8ab385a7c0b72b
CGHMN 1.0
0
79
139
2025-04-11T00:48:31Z
CursedSilicon
1
Created page with "Tracking sheet for "what would we want in a general 1.0 release" The main blocker currently is access to reliable fiber at /dev/hack. Gaining that should give us ample bandwidth to start allowing broader user access to the network generally Maybe invite a selection of "retro networking" youtube folks (TheSerialPort, ClabRetro, etc) to help tire kick things? Serena also suggested federation of retro network service providers, so this could be a useful step"
wikitext
text/x-wiki
Tracking sheet for "what would we want in a general 1.0 release"
The main blocker currently is access to reliable fiber at /dev/hack. Gaining that should give us ample bandwidth to start allowing broader user access to the network generally
Maybe invite a selection of "retro networking" youtube folks (TheSerialPort, ClabRetro, etc) to help tire kick things? Serena also suggested federation of retro network service providers, so this could be a useful step
745321b2c9ec7bd25b2f1c4136b6ab7bd5457b81
140
139
2025-04-11T00:50:50Z
CursedSilicon
1
wikitext
text/x-wiki
== Tracking sheet for "what would we want in a general 1.0 release" ==
Let's break these down by user just to keep division of labor easy
=== CursedSilicon suggestions ===
The main blocker currently is access to reliable fiber at /dev/hack. Gaining that should give us ample bandwidth to start allowing broader user access to the network generally
Maybe invite a selection of "retro networking" youtube folks (TheSerialPort, ClabRetro, etc) to help tire kick things? Serena also suggested federation of retro network service providers, so this could be a useful step.
NVIDIA GPU in the DL360pG8 (or another Proxmox server) would be helpful. Being able to launch DirectX games in a VM and test them on the network itself. '''Nvidia Quadro is currently on order, testing with "Nvidia GRID" in future'''
0c0e267a52d02e9f59c478cd68645974f238525d
141
140
2025-04-12T00:09:58Z
CursedSilicon
1
wikitext
text/x-wiki
== Tracking sheet for "what would we want in a general 1.0 release" ==
Let's break these down by user just to keep division of labor easy
=== CursedSilicon suggestions ===
The main blocker currently is access to reliable fiber at /dev/hack. Gaining that should give us ample bandwidth to start allowing broader user access to the network generally
Maybe invite a selection of "retro networking" youtube folks (TheSerialPort, ClabRetro, etc) to help tire kick things? Serena also suggested federation of retro network service providers, so this could be a useful step.
f6651692c4621f636d0b7235cc6af337098b4d5a
Mac Mini G4
0
80
143
2025-04-18T23:23:13Z
CursedSilicon
1
Created page with "My iMac G3/350 "BlueBerry" died during the March 2025 Interim Computer Festival So I bought a G4 1.5Ghz Mac Mini from [https://os9.shop some dude in Virginia] who sells refurbed ones running OS 9.2.2 of all things? It's a maxed out Mac Mini G4 @ 1.5Ghz with 1GB of RAM and a 120GB mSATA SSD on an IDE adapter card At this time what I'm going to do with it is unclear. I bought it for a data recovery job at work"
wikitext
text/x-wiki
My iMac G3/350 "BlueBerry" died during the March 2025 Interim Computer Festival
So I bought a G4 1.5Ghz Mac Mini from [https://os9.shop some dude in Virginia] who sells refurbed ones running OS 9.2.2 of all things?
It's a maxed out Mac Mini G4 @ 1.5Ghz with 1GB of RAM and a 120GB mSATA SSD on an IDE adapter card
At this time what I'm going to do with it is unclear. I bought it for a data recovery job at work
985206391b639dedb3525a402bc8595a71ce30e6
Powermac G4
0
14
144
38
2025-04-18T23:24:40Z
CursedSilicon
1
wikitext
text/x-wiki
Apple's PowerMac G4 "MDD" or "Mirrored Drive Door" units are common enough and have been documented heavily enough across the internet by people smarter than me that I don't have much to add about them here.
I currently own two units. A Dual 1.42Ghz "Firewire 800" (FW800) model and a Dual 1.25Ghz FW800 model.
== 1.42Ghz model details ==
This machine is outfitted with the maximum 2GB of memory (1.5GB under MacOS 9.2) and the fastest supported GPU, an Nvidia Ti4600
The 1.42Ghz model is also equipped with a SeriTek/1eVE2+2 expansion card. This card appears(?) to have been discontinued as the SeriTek "Yahoo" store is no longer operational.
The SeriTek card provides a 64-bit PCI-X (266MB/s) interface for attaching two SATA II hard disks. The PCI-X bandwidth allows attached drives to operate near their theoretical maximum of 300MB/s (SATA II 3Gbps) however in operation due to the old, slow G4 CPU typical data transfer rates are roughly half that. This is still considerably faster than the ATA-66 IDE bus installed on the motherboard as standard.
The SeriTek card also contains an OpenFirmware compatible Boot ROM, allowing the card to be used to boot OS 9 natively. The additional I/O performance massively improves I/O bound workloads such as "StuffIt" and heavier apps such as ClassZilla.
The internals of the 1.42Ghz model have also been modified. The power supply has been replaced with a PicoPSU style unit for ATX PC's (with corresponding adapter cable) along with dual Noctua 40mm fans for additional cooling. The main CPU fan has been replaced with a 120mm Noctua "PPC" Industrial fan. This fan outputs considerably more airflow than the original fan, while maintaining comparable noise levels. The CPU has yet to be measured above 35C while in operation under this configuration.
At this time the machine currently operates with MacOS 9.2 and OS X 10.5.9 "Sorbet Leopard" from a 240GB SSD partitioned 50/50 between the two operating systems
The second port was originally configured with a second 120GB drive for PPC Linux. However the "nouveau" Linux driver causes system lockups due to (known) endianness issues on PowerPC platforms
== 1.25Ghz model details ==
This machine is currently unused. It was purchased for testing upgrading the [[Xserve G4]] with a faster dual processor CPU however this was unsuccessful.
'''This unit was [https://loganius.org/2025/04/i-bought-a-mac/ later sent to Loganius] and is now their problem'''
== Images ==
[[File:G4 MDD Front.jpg|none|thumb|G4 MDD front]]
[[File:G4 MDD 1.42Ghz (rear).jpg|none|thumb|G4 MDD 1.42Ghz (rear)]]
[[File:G4 MDD 1.25Ghz (rear).jpg|none|thumb|G4 MDD 1.25Ghz (rear)]]
7b7530c84431c74bb7c5022c4751eab8dcfd55ea
145
144
2025-04-18T23:25:39Z
CursedSilicon
1
wikitext
text/x-wiki
Apple's PowerMac G4 "MDD" or "Mirrored Drive Door" units are common enough and have been documented heavily enough across the internet by people smarter than me that I don't have much to add about them here.
I currently own <s>two</s> ONE unit. A Dual 1.42Ghz "Firewire 800" (FW800) model <s>and a Dual 1.25Ghz FW800 model.</s>
== 1.42Ghz model details ==
This machine is outfitted with the maximum 2GB of memory (1.5GB under MacOS 9.2) and the fastest supported GPU, an Nvidia Ti4600
The 1.42Ghz model is also equipped with a SeriTek/1eVE2+2 expansion card. This card appears(?) to have been discontinued as the SeriTek "Yahoo" store is no longer operational.
The SeriTek card provides a 64-bit PCI-X (266MB/s) interface for attaching two SATA II hard disks. The PCI-X bandwidth allows attached drives to operate near their theoretical maximum of 300MB/s (SATA II 3Gbps) however in operation due to the old, slow G4 CPU typical data transfer rates are roughly half that. This is still considerably faster than the ATA-66 IDE bus installed on the motherboard as standard.
The SeriTek card also contains an OpenFirmware compatible Boot ROM, allowing the card to be used to boot OS 9 natively. The additional I/O performance massively improves I/O bound workloads such as "StuffIt" and heavier apps such as ClassZilla.
The internals of the 1.42Ghz model have also been modified. The power supply has been replaced with a PicoPSU style unit for ATX PC's (with corresponding adapter cable) along with dual Noctua 40mm fans for additional cooling. The main CPU fan has been replaced with a 120mm Noctua "PPC" Industrial fan. This fan outputs considerably more airflow than the original fan, while maintaining comparable noise levels. The CPU has yet to be measured above 35C while in operation under this configuration.
At this time the machine currently operates with MacOS 9.2 and OS X 10.5.9 "Sorbet Leopard" from a 240GB SSD partitioned 50/50 between the two operating systems
The second port was originally configured with a second 120GB drive for PPC Linux. However the "nouveau" Linux driver causes system lockups due to (known) endianness issues on PowerPC platforms
== 1.25Ghz model details ==
This machine is currently unused. It was purchased for testing upgrading the [[Xserve G4]] with a faster dual processor CPU however this was unsuccessful.
'''This unit was [https://loganius.org/2025/04/i-bought-a-mac/ later sent to Loganius] and is now their problem'''
== Images ==
[[File:G4 MDD Front.jpg|none|thumb|G4 MDD front]]
[[File:G4 MDD 1.42Ghz (rear).jpg|none|thumb|G4 MDD 1.42Ghz (rear)]]
[[File:G4 MDD 1.25Ghz (rear).jpg|none|thumb|G4 MDD 1.25Ghz (rear)]]
7425c0c4e9de706d47ce6af08e1d7f42c6366d17
146
145
2025-04-18T23:29:27Z
Loganius
6
The G4 1.25 GHz in question was a FW400 model, not a FW800 model.
wikitext
text/x-wiki
Apple's PowerMac G4 "MDD" or "Mirrored Drive Door" units are common enough and have been documented heavily enough across the internet by people smarter than me that I don't have much to add about them here.
I currently own <s>two</s> ONE unit. A Dual 1.42Ghz "Firewire 800" (FW800) model <s>and a Dual 1.25Ghz FW400 model.</s>
== 1.42Ghz model details ==
This machine is outfitted with the maximum 2GB of memory (1.5GB under MacOS 9.2) and the fastest supported GPU, an Nvidia Ti4600
The 1.42Ghz model is also equipped with a SeriTek/1eVE2+2 expansion card. This card appears(?) to have been discontinued as the SeriTek "Yahoo" store is no longer operational.
The SeriTek card provides a 64-bit PCI-X (266MB/s) interface for attaching two SATA II hard disks. The PCI-X bandwidth allows attached drives to operate near their theoretical maximum of 300MB/s (SATA II 3Gbps) however in operation due to the old, slow G4 CPU typical data transfer rates are roughly half that. This is still considerably faster than the ATA-66 IDE bus installed on the motherboard as standard.
The SeriTek card also contains an OpenFirmware compatible Boot ROM, allowing the card to be used to boot OS 9 natively. The additional I/O performance massively improves I/O bound workloads such as "StuffIt" and heavier apps such as ClassZilla.
The internals of the 1.42Ghz model have also been modified. The power supply has been replaced with a PicoPSU style unit for ATX PC's (with corresponding adapter cable) along with dual Noctua 40mm fans for additional cooling. The main CPU fan has been replaced with a 120mm Noctua "PPC" Industrial fan. This fan outputs considerably more airflow than the original fan, while maintaining comparable noise levels. The CPU has yet to be measured above 35C while in operation under this configuration.
At this time the machine currently operates with MacOS 9.2 and OS X 10.5.9 "Sorbet Leopard" from a 240GB SSD partitioned 50/50 between the two operating systems
The second port was originally configured with a second 120GB drive for PPC Linux. However the "nouveau" Linux driver causes system lockups due to (known) endianness issues on PowerPC platforms
== 1.25Ghz model details ==
This machine is currently unused. It was purchased for testing upgrading the [[Xserve G4]] with a faster dual processor CPU however this was unsuccessful.
'''This unit was [https://loganius.org/2025/04/i-bought-a-mac/ later sent to Loganius] and is now their problem'''
== Images ==
[[File:G4 MDD Front.jpg|none|thumb|G4 MDD front]]
[[File:G4 MDD 1.42Ghz (rear).jpg|none|thumb|G4 MDD 1.42Ghz (rear)]]
[[File:G4 MDD 1.25Ghz (rear).jpg|none|thumb|G4 MDD 1.25Ghz (rear)]]
75939edf79f8278414da27ca50208d060d085be6
147
146
2025-04-18T23:36:13Z
Loganius
6
Tweaked some wording.
wikitext
text/x-wiki
Apple's PowerMac G4 "MDD" or "Mirrored Drive Door" units are common enough and have been documented heavily enough across the internet by people smarter than me that I don't have much to add about them here.
I currently own <s>two</s> ONE unit: a dual 1.42Ghz "FireWire 800" (FW800) model <s>and a dual 1.25Ghz FW400 model.</s>
== 1.42Ghz model details ==
This machine is outfitted with the maximum 2GB of memory (1.5GB under MacOS 9.2) and the fastest supported GPU, an Nvidia Ti4600
The 1.42Ghz model is also equipped with a SeriTek/1eVE2+2 expansion card. This card appears(?) to have been discontinued as the SeriTek "Yahoo" store is no longer operational.
The SeriTek card provides a 64-bit PCI-X (266MB/s) interface for attaching two SATA II hard disks. The PCI-X bandwidth allows attached drives to operate near their theoretical maximum of 300MB/s (SATA II 3Gbps) however in operation due to the old, slow G4 CPU typical data transfer rates are roughly half that. This is still considerably faster than the ATA-66 IDE bus installed on the motherboard as standard.
The SeriTek card also contains an OpenFirmware compatible Boot ROM, allowing the card to be used to boot OS 9 natively. The additional I/O performance massively improves I/O bound workloads such as "StuffIt" and heavier apps such as ClassZilla.
The internals of the 1.42Ghz model have also been modified. The power supply has been replaced with a PicoPSU style unit for ATX PC's (with corresponding adapter cable) along with dual Noctua 40mm fans for additional cooling. The main CPU fan has been replaced with a 120mm Noctua "PPC" Industrial fan. This fan outputs considerably more airflow than the original fan, while maintaining comparable noise levels. The CPU has yet to be measured above 35C while in operation under this configuration.
At this time the machine currently operates with MacOS 9.2 and OS X 10.5.9 "Sorbet Leopard" from a 240GB SSD partitioned 50/50 between the two operating systems
The second port was originally configured with a second 120GB drive for PPC Linux. However the "nouveau" Linux driver causes system lockups due to (known) endianness issues on PowerPC platforms
== 1.25Ghz model details ==
This machine was originally purchased for testing upgrading the [[Xserve G4]] with a faster dual processor CPU; however, this was unsuccessful.
'''It has since been [https://loganius.org/2025/04/i-bought-a-mac/ sent to Loganius] and is now their problem.'''
== Images ==
[[File:G4 MDD Front.jpg|none|thumb|G4 MDD front]]
[[File:G4 MDD 1.42Ghz (rear).jpg|none|thumb|G4 MDD 1.42Ghz (rear)]]
[[File:G4 MDD 1.25Ghz (rear).jpg|none|thumb|G4 MDD 1.25Ghz (rear)]]
cd593af3b006972b19b732284b5d1c0392ffe80f
File:CGHMN.png
6
81
148
2025-04-21T23:47:47Z
CursedSilicon
1
wikitext
text/x-wiki
CGHMN demo router
17044fd19548d0e06534146eb2f065b75a58d805
How to Get Connected
0
82
149
2025-04-21T23:49:31Z
CursedSilicon
1
Created page with "This is a quick and dirty "how do I get on CGHMN" Right now since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation Right now to get connected you effectively need three things: * '''An ethernet connection on your device of choice. With a TCP/IP (v4) stack! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works''' * '''Something with the abil..."
wikitext
text/x-wiki
This is a quick and dirty "how do I get on CGHMN"
Right now since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation
Right now to get connected you effectively need three things:
* '''An ethernet connection on your device of choice. With a TCP/IP (v4) stack! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works'''
* '''Something with the ability to run Wireguard and gretap. Personally we recommend something running OpenWRT, like a GL-AR300M16. We even have an install script for that which will handle setting it all up for you!
'''
* '''A network switch. Literally any kind of network switch. You plug one end into the Wireguard box and then your clients can all access CGHMN. Super easy'''
If you do everything correctly you'll have a hardware setup something like this
[[File:CGHMN.png|thumb]]
1941bf79ef7b4566b77719f2c5230bd9097db284
151
149
2025-04-24T01:41:57Z
Snep
5
Added OpenWRT tutorial and Admin tutorial
wikitext
text/x-wiki
This is a quick and dirty "how do I get on CGHMN"
Right now since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation
Right now to get connected you effectively need three things, hardware wise:
[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router via SSH
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following: '''Instance:''' <code>WG_Member</code> '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code> Â Â '''Name:''' <code>member.''<Nickname of the new member>''</code> Â Â '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code> Â Â '''Private Key:''' <code>''<blank>''</code> Â Â '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>'' Â Â '''Pre-Shared Key:''' <code>''<blank>''</code> Â Â '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, see below>''</code> Â Â '''Keepalive interval:''' ''<code><blank></code>'' Â Â '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do either one of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
ad35f1cc1970ac18f65d82c8f61e5282a4339b26
152
151
2025-04-24T01:47:15Z
Snep
5
damn linebreaks
wikitext
text/x-wiki
This is a quick and dirty "how do I get on CGHMN"
Right now since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation
Right now to get connected you effectively need three things, hardware wise:
[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router via SSH
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, see below>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do either one of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
7bc5a1d3c53ab0bc0ba0259592333335b4d7f39d
153
152
2025-04-24T01:48:11Z
Snep
5
Added a link to user admin side tutorial
wikitext
text/x-wiki
This is a quick and dirty "how do I get on CGHMN"
Right now since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation
Right now to get connected you effectively need three things, hardware wise:
[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router via SSH
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do either one of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
03d449bdda6afb9e04c963c9015bd4150492f902
156
153
2025-05-05T22:30:50Z
Snep
5
Added reminder to add member connection to IP allocations table
wikitext
text/x-wiki
This is a quick and dirty "how do I get on CGHMN"
Right now since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation
Right now to get connected you effectively need three things, hardware wise:
[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router via SSH
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
<nowiki>#</nowiki> TODO: Add Linux commands to get connected without OpenWRT
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do either one of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
# Rember to add the member and their tunnel and subnet IPs to the [[CGHMN-IP-Allocations|IP allocations page]] :)
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
8151839d9442dfbb063ca9de1526dc0af11aed8a
File:Example Configuration for new Wireguard Peer on Core Router.png
6
83
150
2025-04-24T01:16:17Z
Snep
5
wikitext
text/x-wiki
Shows an example of all the values filled in, which are needed to add a new Member Wireguard connection to the Core Router
b08d17001db34a945c6ed9623b02d15fd9ece882
External Services
0
84
154
2025-04-29T21:39:45Z
CursedSilicon
1
WIP
wikitext
text/x-wiki
So! You want to run services on CGHMN. But you also want them to be accessible to the broader internet?
By default the network is designed to be effectively "hermetically sealed". IE: Clients can connect '''''into the network''''' but aren't really meant to have internet access or the ability to talk to "the outside"
This is still "the default" for the innumerable amount of security (and legal!) issues that could arise for the network if we effectively acted as an "open web proxy with extra steps" but that's not a discussion for here!
Currently the two ways to bridge external services are
1. '''Run your own gateway!''' We can't really "stop" you from running a proxy to the real internet or other services. We can (and do) '''''heavily suggest against this''''' as anything (and everything) that comes out of it is effectively "your" traffic.
At the bare minimum you probably want to use some kind of IP whitelisting (both for source and destination) and bandwidth limiting. Anything you can do to minimize harm to yourself the better!
2. '''Use a middlebox!''' Okay so this isn't much "more" fool-proofed than option #1 but is effectively how we've got the (few) services that warrant internet access configured.
02fe4b016c137a35163772ab63e511253a39dea5
CGHMN-IP-Allocations
0
77
158
157
2025-05-06T22:42:36Z
Ilostmybagel
3
/* Members' Networks */ Put what device I'm using in the Connection Name
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|MT300n Router
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
6ce4f27242afe52d4d4665d5841785a226c207a5
160
158
2025-05-09T21:13:07Z
Snep
5
Added loganius
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|MT300n Router
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Loganius
| -
|100.89.128.8
|100.96.8.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
08365bb731cd0c27867c6e9f2558d4bcc1e39fd5
161
160
2025-05-09T21:14:02Z
Snep
5
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Loganius
| -
|100.89.128.8
|100.96.8.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
00856edd00f1b44805a3063982e42435bd364cdb
162
161
2025-05-09T21:20:17Z
Ilostmybagel
3
/* Members' Networks */
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge r620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Loganius
| -
|100.89.128.8
|100.96.8.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
90281f86ca584274e776852e50c4284ccf0ce7a5
163
162
2025-05-09T21:31:41Z
Snep
5
Added Lily Hosting
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge r620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Hosting
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| -
|100.89.128.9
|100.96.9.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
b1a3b0e5ba3b52bc4dfac0ac4da2e7e831d121a6
164
163
2025-05-09T23:33:47Z
Snep
5
Added GothPanda
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge r620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Hosting
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| -
|100.89.128.9
|100.96.9.0/24
| -
|-
|GothPanda
| -
|100.89.128.10
|100.96.10.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
f9ed2d62ccda0f02f5215329439990e9c12c4506
165
164
2025-05-11T00:27:53Z
Ilostmybagel
3
/* Member-Delegated (Sub-) Domains */ Added lily.retro to the member-delegated domains
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge r620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Hosting
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| -
|100.89.128.9
|100.96.9.0/24
| -
|-
|GothPanda
| -
|100.89.128.10
|100.96.10.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
7dc759fc0f7ec37d7b759a51479c301f95df8ef1
176
165
2025-05-15T21:56:16Z
Loganius
6
Added my domain to the list of member delegated subdomains.
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge r620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Hosting
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| -
|100.89.128.9
|100.96.9.0/24
| -
|-
|GothPanda
| -
|100.89.128.10
|100.96.10.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|loganius-win2k3.loganius.retro
|100.96.9.1
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|}
1ba90e61c848e3f72f1d6e88d00ba5d3563319ef
184
176
2025-05-17T15:12:47Z
Talija
10
Updated for kat.gorl and added category
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge r620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Hosting
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| -
|100.89.128.9
|100.96.9.0/24
| -
|-
|GothPanda
| -
|100.89.128.10
|100.96.10.0/24
| -
|-
|kat.gorl
| -
|100.89.128.11
|100.96.11.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.100
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|loganius-win2k3.loganius.retro
|100.96.9.1
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
6385fbbce392a7ef87f4b4c99bc94e26f3d17df4
185
184
2025-05-17T15:15:35Z
Talija
10
/* Member-Delegated (Sub-) Domains */
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge r620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Hosting
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| -
|100.89.128.9
|100.96.9.0/24
| -
|-
|GothPanda
| -
|100.89.128.10
|100.96.10.0/24
| -
|-
|kat.gorl
| -
|100.89.128.11
|100.96.11.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|loganius-win2k3.loganius.retro
|100.96.9.1
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
|`
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
6ff780fd1f84f08ad043b54285ca595cfc735e27
186
185
2025-05-18T03:04:54Z
Talija
10
updated ch0ccyra1n's name (was kat.gorl)
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge r620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Hosting
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| -
|100.89.128.9
|100.96.9.0/24
| -
|-
|GothPanda
| -
|100.89.128.10
|100.96.10.0/24
| -
|-
|ch0ccyra1n
| -
|100.89.128.11
|100.96.11.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|loganius-win2k3.loganius.retro
|100.96.9.1
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
|`
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
ce7d75b42265147bfdfd933de8e8ebae25c2352d
187
186
2025-05-18T03:10:02Z
Ilostmybagel
3
/* Members' Networks */
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| -
|100.89.128.9
|100.96.9.0/24
| -
|-
|GothPanda
| -
|100.89.128.10
|100.96.10.0/24
| -
|-
|ch0ccyra1n
| -
|100.89.128.11
|100.96.11.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|loganius-win2k3.loganius.retro
|100.96.9.1
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
|`
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
854331a88aff2893699f24bb930f21df38fd7850
189
187
2025-05-25T05:30:32Z
Loganius
6
Update my DNS info
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection Name
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|AR300 Router
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| -
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| -
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| -
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| -
|100.89.128.9
|100.96.9.0/24
| -
|-
|GothPanda
| -
|100.89.128.10
|100.96.10.0/24
| -
|-
|ch0ccyra1n
| -
|100.89.128.11
|100.96.11.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
31f76d2ff0ae3480b7f6c4f20790f01d048fb5a6
190
189
2025-05-25T05:50:40Z
CursedSilicon
1
Added Chromaryu
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection "Method"
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| Unknown
|100.89.128.9
|100.96.9.0/24
| -
|-
|GothPanda
| Unknown
|100.89.128.10
|100.96.10.0/24
| -
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
d51495555c8dcc645774ca672781b71f8145ff47
191
190
2025-05-25T05:58:10Z
Loganius
6
Added my connection method.
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Connection "Method"
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| Unknown
|100.89.128.10
|100.96.10.0/24
| -
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|Snep
|snep.retro
|ns1.snep.retro
|172.23.8.11
| -
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
aa54c6f9c72cbff9eb57e2823c1e3ed0b5fbc3d8
192
191
2025-05-25T21:33:01Z
Snep
5
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| Unknown
|100.89.128.10
|100.96.10.0/24
| -
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
70208bb69a21a5b5b7814e849a69ed24bb270fd7
195
192
2025-05-31T04:48:51Z
CursedSilicon
1
Added devhack IP range
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| Unknown
|100.89.128.10
|100.96.10.0/24
| -
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
d071e3e377dff0dc54089aad3b83157f0dbcd2c1
207
195
2025-06-06T09:01:17Z
CursedSilicon
1
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| Unknown
|100.89.128.10
|100.96.10.0/24
| -
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
ade21dcb0acf1d9ae0a8a657a0ccda261991f07e
How to Get Connected
0
82
159
156
2025-05-07T04:26:09Z
Snep
5
Added short Get Connected for manual Wireguard connections
wikitext
text/x-wiki
This is a quick and dirty "how do I get on CGHMN"
Right now since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation
Right now to get connected you effectively need three things, hardware wise:
[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router via SSH
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get Connected - Manually (Linux, Wireguard only, GRETAP follows shortly) ===
In case you want to setup a connection into the network manually, here are the required steps and information you should be needing:
* Generate a Wireguard private key and public key, this command writes a fresh Wireguard private key to <code>private-key</code> and the corresponsing public key to <code>public-key</code>:
$ wg genkey | tee private-key | wg pubkey > public-key
* NEVER share your private key, even with us! It should never be required outside of your own Wireguard setup!
* You will, however, need to share your public key with us. Send CursedSilicon or Snep on the Discord or via IRC a message including the public key and we'll add you to the tunnel.
* In return, you'll get two IP addresses from us: Your tunnel IP address, with which your router talks to our router, and a routed subnet, from which you can assign IPs to your own machines so they can talk to other CGHMN member devices on the network without NAT in the way.
* Next, you'll need to fill a Wireguard configuration file with the two IP addresses, like below:
[Interface]
PrivateKey = <Your private key goes here>
Address = <Your tunnel IP address goes here>/32
DNS = 100.89.128.0
MTU = 1420
[Peer]
PublicKey = k/QiJIbMakMKgTCHVt8/D+8k4DzRVM6U33F3gMZfRUg=
Endpoint = wg-admin.cursedsilicon.net:42070
AllowedIPs = 172.23.0.0/16, 100.89.128.0/22, 100.96.0.0/13
PersistentKeepalive = 15
* Save this file as <code>wg-cghmn.conf</code>, for example.
* Then, run <code>wg-quick up ./wg-cghmn.conf</code>, perhaps requiring <code>doas</code>/<code>sudo</code>, to bring the tunnel up and connect to the network!
This should bring whatever system you've set the tunnel up on onto the network and is now reachable for other members on the network, as long as the firewall on your device is congfigured accordingly, of course.
<nowiki>#</nowiki>TODO: Add example of routed subnet configuration, perhaps on a different Wiki site
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do either one of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
# Rember to add the member and their tunnel and subnet IPs to the [[CGHMN-IP-Allocations|IP allocations page]] :)
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
a0f6fdb4f84b5afb8b38f398ec20e9168ade2fba
170
159
2025-05-11T02:33:31Z
Ilostmybagel
3
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
This is a quick and dirty "how do I get on CGHMN"
Right now since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation
Right now to get connected you effectively need three things, hardware wise:
[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router via SSH
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get Connected - Manually (Linux, Wireguard only, GRETAP follows shortly) ===
In case you want to setup a connection into the network manually, here are the required steps and information you should be needing:
* Generate a Wireguard private key and public key, this command writes a fresh Wireguard private key to <code>private-key</code> and the corresponsing public key to <code>public-key</code>:
$ wg genkey | tee private-key | wg pubkey > public-key
* NEVER share your private key, even with us! It should never be required outside of your own Wireguard setup!
* You will, however, need to share your public key with us. Send CursedSilicon or Snep on the Discord or via IRC a message including the public key and we'll add you to the tunnel.
* In return, you'll get two IP addresses from us: Your tunnel IP address, with which your router talks to our router, and a routed subnet, from which you can assign IPs to your own machines so they can talk to other CGHMN member devices on the network without NAT in the way.
* Next, you'll need to fill a Wireguard configuration file with the two IP addresses, like below:
[Interface]
PrivateKey = <Your private key goes here>
Address = <Your tunnel IP address goes here>/32
DNS = 100.89.128.0
MTU = 1420
[Peer]
PublicKey = k/QiJIbMakMKgTCHVt8/D+8k4DzRVM6U33F3gMZfRUg=
Endpoint = wg-admin.cursedsilicon.net:42070
AllowedIPs = 172.23.0.0/16, 100.89.128.0/22, 100.96.0.0/13
PersistentKeepalive = 15
* Save this file as <code>wg-cghmn.conf</code>, for example.
* Then, run <code>wg-quick up ./wg-cghmn.conf</code>, perhaps requiring <code>doas</code>/<code>sudo</code>, to bring the tunnel up and connect to the network!
This should bring whatever system you've set the tunnel up on onto the network and is now reachable for other members on the network, as long as the firewall on your device is congfigured accordingly, of course.
<nowiki>#</nowiki>TODO: Add example of routed subnet configuration, perhaps on a different Wiki site
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do either one of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
# Rember to add the member and their tunnel and subnet IPs to the [[CGHMN-IP-Allocations|IP allocations page]] :)
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
11c765bb0983927c8b828da3f06c9f816e7e447a
173
170
2025-05-12T09:05:35Z
CursedSilicon
1
Added link to Signup page
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
This is a quick and dirty "how do I get on CGHMN"
'''Since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation'''
=== Step 1: ===
[[Signup|'''Let us know you'd like to connect!''']]
(We'll need information from you such as your Wireguard Pubkey to let you connect to the network)[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router via SSH
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get Connected - Manually (Linux, Wireguard only, GRETAP follows shortly) ===
In case you want to setup a connection into the network manually, here are the required steps and information you should be needing:
* Generate a Wireguard private key and public key, this command writes a fresh Wireguard private key to <code>private-key</code> and the corresponsing public key to <code>public-key</code>:
$ wg genkey | tee private-key | wg pubkey > public-key
* NEVER share your private key, even with us! It should never be required outside of your own Wireguard setup!
* You will, however, need to share your public key with us. Send CursedSilicon or Snep on the Discord or via IRC a message including the public key and we'll add you to the tunnel.
* In return, you'll get two IP addresses from us: Your tunnel IP address, with which your router talks to our router, and a routed subnet, from which you can assign IPs to your own machines so they can talk to other CGHMN member devices on the network without NAT in the way.
* Next, you'll need to fill a Wireguard configuration file with the two IP addresses, like below:
[Interface]
PrivateKey = <Your private key goes here>
Address = <Your tunnel IP address goes here>/32
DNS = 100.89.128.0
MTU = 1420
[Peer]
PublicKey = k/QiJIbMakMKgTCHVt8/D+8k4DzRVM6U33F3gMZfRUg=
Endpoint = wg-admin.cursedsilicon.net:42070
AllowedIPs = 172.23.0.0/16, 100.89.128.0/22, 100.96.0.0/13
PersistentKeepalive = 15
* Save this file as <code>wg-cghmn.conf</code>, for example.
* Then, run <code>wg-quick up ./wg-cghmn.conf</code>, perhaps requiring <code>doas</code>/<code>sudo</code>, to bring the tunnel up and connect to the network!
This should bring whatever system you've set the tunnel up on onto the network and is now reachable for other members on the network, as long as the firewall on your device is congfigured accordingly, of course.
<nowiki>#</nowiki>TODO: Add example of routed subnet configuration, perhaps on a different Wiki site
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do either one of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
# Rember to add the member and their tunnel and subnet IPs to the [[CGHMN-IP-Allocations|IP allocations page]] :)
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
988f3b8f184e8df119a34a1093c6565696cfa5aa
188
173
2025-05-22T08:55:48Z
Theothertom
11
Add a link to network status mailing list
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
This is a quick and dirty "how do I get on CGHMN"
'''Since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation'''
=== Step 1: ===
[[Signup|'''Let us know you'd like to connect!''']]
(We'll need information from you such as your Wireguard Pubkey to let you connect to the network)[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router via SSH
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get Connected - Manually (Linux, Wireguard only, GRETAP follows shortly) ===
In case you want to setup a connection into the network manually, here are the required steps and information you should be needing:
* Generate a Wireguard private key and public key, this command writes a fresh Wireguard private key to <code>private-key</code> and the corresponsing public key to <code>public-key</code>:
$ wg genkey | tee private-key | wg pubkey > public-key
* NEVER share your private key, even with us! It should never be required outside of your own Wireguard setup!
* You will, however, need to share your public key with us. Send CursedSilicon or Snep on the Discord or via IRC a message including the public key and we'll add you to the tunnel.
* In return, you'll get two IP addresses from us: Your tunnel IP address, with which your router talks to our router, and a routed subnet, from which you can assign IPs to your own machines so they can talk to other CGHMN member devices on the network without NAT in the way.
* Next, you'll need to fill a Wireguard configuration file with the two IP addresses, like below:
[Interface]
PrivateKey = <Your private key goes here>
Address = <Your tunnel IP address goes here>/32
DNS = 100.89.128.0
MTU = 1420
[Peer]
PublicKey = k/QiJIbMakMKgTCHVt8/D+8k4DzRVM6U33F3gMZfRUg=
Endpoint = wg-admin.cursedsilicon.net:42070
AllowedIPs = 172.23.0.0/16, 100.89.128.0/22, 100.96.0.0/13
PersistentKeepalive = 15
* Save this file as <code>wg-cghmn.conf</code>, for example.
* Then, run <code>wg-quick up ./wg-cghmn.conf</code>, perhaps requiring <code>doas</code>/<code>sudo</code>, to bring the tunnel up and connect to the network!
This should bring whatever system you've set the tunnel up on onto the network and is now reachable for other members on the network, as long as the firewall on your device is congfigured accordingly, of course.
<nowiki>#</nowiki>TODO: Add example of routed subnet configuration, perhaps on a different Wiki site
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do either one of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
# Rember to add the member and their tunnel and subnet IPs to the [[CGHMN-IP-Allocations|IP allocations page]] :)
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
=== After you get connected ===
There are a few optional things you might want to do.
==== Network mailing list ====
There is a mailing list you can subscribe to if you want to be notified about things that may affect CGHMN or core services. You can subscribe to the list here: https://berwick-upon-tweed.cobaltqu.be/postorius/lists/cghmn-announce.lists.cobaltqu.be/.
If you need to post to the list, you will need to subscribe before you can be added to the list of poster.
9153f4f98da9bf93a423d140c3439008adabffbe
193
188
2025-05-26T02:47:51Z
CursedSilicon
1
Minor readability change
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
This is a quick and dirty "how do I get on CGHMN"
'''Since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation'''
=== Step 1: ===
[[Signup|'''Let us know you'd like to connect!''']]
(We'll need information from you such as your Wireguard Pubkey to let you connect to the network)[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router via SSH
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get Connected - Manually (Linux, Wireguard only, GRETAP follows shortly) ===
In case you want to setup a connection into the network manually, here are the required steps and information you should be needing:
* Generate a Wireguard private key and public key, this command writes a fresh Wireguard private key to <code>private-key</code> and the corresponsing public key to <code>public-key</code>:
$ wg genkey | tee private-key | wg pubkey > public-key
* NEVER share your private key, even with us! It should never be required outside of your own Wireguard setup!
* You will, however, need to share your public key with us. Send CursedSilicon or Snep on the Discord or via IRC a message including the public key and we'll add you to the tunnel.
* In return, you'll get two IP addresses from us: Your tunnel IP address, with which your router talks to our router, and a routed subnet, from which you can assign IPs to your own machines so they can talk to other CGHMN member devices on the network without NAT in the way.
* Next, you'll need to fill a Wireguard configuration file with the two IP addresses, like below:
[Interface]
PrivateKey = <Your private key goes here>
Address = <Your tunnel IP address goes here>/32
DNS = 100.89.128.0
MTU = 1420
[Peer]
PublicKey = k/QiJIbMakMKgTCHVt8/D+8k4DzRVM6U33F3gMZfRUg=
Endpoint = wg-admin.cursedsilicon.net:42070
AllowedIPs = 172.23.0.0/16, 100.89.128.0/22, 100.96.0.0/13
PersistentKeepalive = 15
* Save this file as <code>wg-cghmn.conf</code>, for example.
* Then, run <code>wg-quick up ./wg-cghmn.conf</code>, perhaps requiring <code>doas</code>/<code>sudo</code>, to bring the tunnel up and connect to the network!
This should bring whatever system you've set the tunnel up on onto the network and is now reachable for other members on the network, as long as the firewall on your device is congfigured accordingly, of course.
<nowiki>#</nowiki>TODO: Add example of routed subnet configuration, perhaps on a different Wiki site
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do '''either one''' '''(not both!)''' of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
# Rember to add the member and their tunnel and subnet IPs to the [[CGHMN-IP-Allocations|IP allocations page]] :)
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
=== After you get connected ===
There are a few optional things you might want to do.
==== Network mailing list ====
There is a mailing list you can subscribe to if you want to be notified about things that may affect CGHMN or core services. You can subscribe to the list here: https://berwick-upon-tweed.cobaltqu.be/postorius/lists/cghmn-announce.lists.cobaltqu.be/.
If you need to post to the list, you will need to subscribe before you can be added to the list of poster.
de6a5612a135398df2e9f9142f771ca3c8399c77
194
193
2025-05-26T13:38:25Z
Snep
5
Slight updates to the setup script
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
This is a quick and dirty "how do I get on CGHMN"
'''Since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation'''
=== Step 1: ===
[[Signup|'''Let us know you'd like to connect!''']]
(We'll need information from you such as your Wireguard Pubkey to let you connect to the network)[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router: <code>wget https://cghmn.snep.zip/connect.sh</code>
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server. If you cannot copy-paste, for example, because you're on a VM VNC console, you can run <code>ash setup-cghmn.sh pubkey-qr</code> to get a QR code printout of your public key, which can be scanned with a phone, tablet or software QR code parser to get the key as copy-pastable text.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get Connected - Manually (Linux, Wireguard only, GRETAP follows shortly) ===
In case you want to setup a connection into the network manually, here are the required steps and information you should be needing:
* Generate a Wireguard private key and public key, this command writes a fresh Wireguard private key to <code>private-key</code> and the corresponsing public key to <code>public-key</code>:
$ wg genkey | tee private-key | wg pubkey > public-key
* NEVER share your private key, even with us! It should never be required outside of your own Wireguard setup!
* You will, however, need to share your public key with us. Send CursedSilicon or Snep on the Discord or via IRC a message including the public key and we'll add you to the tunnel.
* In return, you'll get two IP addresses from us: Your tunnel IP address, with which your router talks to our router, and a routed subnet, from which you can assign IPs to your own machines so they can talk to other CGHMN member devices on the network without NAT in the way.
* Next, you'll need to fill a Wireguard configuration file with the two IP addresses, like below:
[Interface]
PrivateKey = <Your private key goes here>
Address = <Your tunnel IP address goes here>/32
DNS = 100.89.128.0
MTU = 1420
[Peer]
PublicKey = k/QiJIbMakMKgTCHVt8/D+8k4DzRVM6U33F3gMZfRUg=
Endpoint = wg-admin.cursedsilicon.net:42070
AllowedIPs = 172.23.0.0/16, 100.89.128.0/22, 100.96.0.0/13
PersistentKeepalive = 15
* Save this file as <code>wg-cghmn.conf</code>, for example.
* Then, run <code>wg-quick up ./wg-cghmn.conf</code>, perhaps requiring <code>doas</code>/<code>sudo</code>, to bring the tunnel up and connect to the network!
This should bring whatever system you've set the tunnel up on onto the network and is now reachable for other members on the network, as long as the firewall on your device is congfigured accordingly, of course.
<nowiki>#</nowiki>TODO: Add example of routed subnet configuration, perhaps on a different Wiki site
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do '''either one''' '''(not both!)''' of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
# Rember to add the member and their tunnel and subnet IPs to the [[CGHMN-IP-Allocations|IP allocations page]] :)
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
=== After you get connected ===
There are a few optional things you might want to do.
==== Network mailing list ====
There is a mailing list you can subscribe to if you want to be notified about things that may affect CGHMN or core services. You can subscribe to the list here: https://berwick-upon-tweed.cobaltqu.be/postorius/lists/cghmn-announce.lists.cobaltqu.be/.
If you need to post to the list, you will need to subscribe before you can be added to the list of poster.
e469b096511cbadb740a649a398bb3cad38c7bbb
Category:Compu-Global-Hyper-Mega-Net
14
85
166
2025-05-11T02:31:14Z
Ilostmybagel
3
Created page with "Pages relating to the Compu-Global-Hyper-Mega-Net"
wikitext
text/x-wiki
Pages relating to the Compu-Global-Hyper-Mega-Net
3f46513c5c4d58f0a215eda980400b20e5bb5b88
Compu-Global-Hyper-Mega-Net
0
61
167
138
2025-05-11T02:32:20Z
Ilostmybagel
3
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990's era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "fun" for us!
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines
=== Okay so how do I connect to it ===
You can sign up '''[[Signup|right now]]!''' to "alpha test" the network
=== How fast is it? ===
Total internal network capacity is '''''1Gbps''''' (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members.
Your speed will depend on factors such as how fast your device can run Wireguard and your internet connection
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
=== How can I help? ===
A lot of folks have offered to donate server hosting which is wonderful. Though not (yet!) required. The two biggest things we need are
'''Donations to buy infrastructure''' (Particularly hard disks!) there's an Amazon Wishlist here that will get updated over time. https://www.amazon.com/hz/wishlist/ls/1W3S0E9IN7ZB7?ref_=wl_share
'''Volunteers who want to set up services'''. Want to come build a website? Run an old game server? Have some weird retro hardware you want to attach to the network? Please, reach out!
f92df26e58e51d2f2d420dcc60b2630617ab9917
CGHMN-Demo-Network
0
76
168
131
2025-05-11T02:33:01Z
Ilostmybagel
3
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
=== Demo Network for the Interim Computer Festival ===
This page documents the quickly set up demo network to show off the CGHMN network at the [https://sdf.org/icf/ SDF's Interim Computer Festival] taking place between March 22nd and 23rd. Consider this a sort-of draft, an experimental first version, a test on what might work and what doesn't.
Currently, the basics are up and running on the CGHMN Proxmox hypervisor living in the [https://devhack.net/ /dev/hack Hackerspace] in Seattle. These include a router and Wireguard endpoint through an OPNsense VM, a VXLAN tunnel endpoint container with some custom scripts to make deploying new member tunnel easier and two containers running a basic authoritative BIND DNS server for <code>.cghmn</code> and <code>.retro</code> and one hosting a custom, internal Certificate Authority for those domains.
=== Changes to the network layout ===
Since this page was written, there have been quite a lot of discussions about how and what we might change going forward, after the initial test of the network at the ICF was a success. The biggest change, so far, has been the idea to move away from VXLANs to GRETAP tunnels for the Layer 2 and non-IP Layer 3 traffic. This is mostly due to the fact that VXLANs, by their RFC definition, MAY NOT fragment packets coming into the VTEP (aka. a VXLAN tunnel endpoint) and packets flowing out of a VTEP MAY be reassembled if fragmented, but don't necessarily have to. In addition to this, the IP packets generated by the VXLAN tunnels have the Don't Fragment bit set, so those packets may also not be fragmented. This means that the underlying transport of the VXLAN tunnels, here Wireguard, would have to open a path that allows 1500 byte frames through its tunnel, which would make the tunnel packets themselves quite large at ~1600 bytes, which would then be fragmented by whatever routers are in between the client router and the CGHMN router. Turns out, that's quite inefficient.
GRETAP tunnels, on the other hand, have the two flags <code>ignore-df</code> and <code>nopmtudisc</code>, which together with <code>ttl 255</code> create a tunnel over IP, which can carry ''and fragment'' 1500 byte Ethernet frames over a smaller underlying transport, still Wireguard in this case. This was a massive boost not only in speed under certain circumstances, like running this all on a small travel router with a weak MIPS CPU, but also reliability, as less dropped packets could be observed and MTU blackholes finally not happening in our testing.
To bring up a GRETAP tunnel within the network to the CGHMN central router, use the following commands on a Linux box:<blockquote><code>ip link add gretap-cghmn type gretap remote 172.23.4.103 dev wg0 ignore-df nopmtudisc ttl 255</code>
<code>ip link set gretap-cghmn master br0 mtu 1500</code>
<code>ip link set gretap-cghmn up</code></blockquote>Where <code>wg0</code> is your CGHMN Wireguard tunnel and <code>br0</code> is the bridge you'd want to bridge the GRETAP tunnel to.
However, to improve performance more and make the network a little more reliable, there was another idea for a change: Sending routable IP traffic not over the Layher 2 tunnel, but rather routing it directly through the Wireguard tunnel, which already is a straight Layer 3 path to the CGHMN core router. This is possible due to the nftables <code>bridge</code> filter table, which can match and filter packets on bridge interfaces, incuding what "bridge port" they come in and go out of. This means we can filter IP traffic from leaving the retro LAN bridge, to which you'd connect your retro machines via a phyiscal LAN port, by creating a filter that says "Block all traffic on bridge <code>br-retrolan</code> which leaves through a GRETAP interface" and "Block all traffic on bridge <code>br-retrolan</code> which comes in on a GRETAP interface". Now, you can assign the router a static IP address on the bridge, so it can talk to your retro machines, enable DHCP and NAT and route IP traffic from your machines straight to the CGHMN via Wireguard. In the future, this shall be extended to work without NAT on the client side, so that every member has a small subnet, /24 for example, which is routed to the Wireugard tunnel client IP. This also means that the VLAN1 described in the next section might not need an IP address in the future so that the VLAN1 is purely non-IP traffic at least from the CGHMN side of things.
Yet another idea mentioned was the ability to span tunnels directly between members, even without going through the CGHMN core network in the first place. This can be accomplished by creating another GRETAP interface whose <code>remote</code> IP argument points to the IP of another members router, either through the existing CGHMN Wireguard tunnel or through a separate tunnel that you span between you and the other member. This GRETAP interface is then bridged to the <code>br-retrolan</code> bridge and with a couple of (perhaps default) bridge firewall rules, you and the other member should be able to communicate directly! Of course, this also means we'd have to implement some sort of loopback protection not just on the member router side (the default bridge firewall rules mentioned in the last sentence), but also on the core router side. so this idea is not yet fully implemented for testing.
IP Allocations within the network are now kept track of [[CGHMN-IP-Allocations|in this Wiki page]], though the IPs listed there might not be applied in the current configuration yet.
=== Network Layout ===
This section describes the network layout currently set up for the CGHMN demo network, none of which is necessarily permanent and already set in stone. I (Snep) made some assumptions about domain names, IP addresses, firewall rules and general design ideas to get something up and running for the computer festival based on info from the many chats and discussions on the Cursed Silicon Discord's CGHMN channel (See [[Signup]] for more details). So, please feel free to give input on things you'd like to see changed or added!
On the Proxmox host, all VLANs mentioned below are available tagged on the bridge <code>brcghmn</code>, with exception of VLAN1, which is untagged and the default network when a new container or VM is added to this bridge.
For servers and retro clients, the subnet <code>172.23.0.0/16</code> is currently in place, divided into smaller subnets, and might be subject to change later down the line. For Wireguard clients, the <code>100.89.128.0/22</code> subnet out of the CGNAT block is used and again, might change later.
Below is a further breakdown of VLANs existing in this CGHMN demo network:
==== VLAN 1 - The Global LAN (172.23.0.0/22) ====
This network is our layer 2 bridged network to all members who wish to participate and is intended to be used for retro computers to directly communicate with each other even across the globe. This is accomplished by spanning a VXLAN tunnel across a Wireguard connection from the CGHMN server infrastructure to each members' router endpoint, which can be any OpenWRT compatible device that contains the packages for VXLANs and Wireguard. The idea is to bridge on of at least two available interfaces from said router to the VXLAN network and thus directly bridge any connected retro machines to VLAN1. All members will be in the same L2 broadcast domain, meaning even non-IP protocols that are able to run over Ethernet should be able to communicate with each other from all over the world.
Machines on this network are able to connect to all hosts on the Server VLAN (see below), the firewall for DNS, NTP and ICMP queries and to the root DNS and CA servers for DNS queries and HTTP access to the CA web server. They may also query DNS lookups at the legacy DNS server at <code>172.23.0.104</code>. They are not, however, able to communicate with any hosts on the internet, the /dev/hack network or any of the other existing VLANs aside from specific exceptions.
Addresses are handed out via DHCP by the router in the range <code>172.23.1.1-172.23.3.254</code>, the range <code>172.23.1.11-172.23.1.255</code> is reserved for static hosts. The search domain for this network is <code>clients.retro</code>.
==== VLAN 4 - Core Services (172.23.4.0/22) ====
This VLAN in intended for core internal services, like the root DNS server, VXLAN endpoint and our custom Certificate Authority. The Proxmox host also has an IP address in this subnet (<code>172.23.4.11</code>), it does not however have any routes to the rest of this CGHMN demo infrastructure and thus can only be accessed from clients in the Core Services subnet.
Hosts in this subnet may currently access the internet, the router for DNS, NTP and ICMP queries, query DNS lookups at the legacy DNS server at <code>172.23.4.104</code> and the VXLAN endpoint may send UDP datagrams to anyone at port <code>4789</code> for VXLAN tunnel replies, any other internal connections are prohibited.
Addresses are handed out via DHCP by the router in the range <code>172.23.7.1-172.23.7.254</code>, the range <code>172.23.4.11-172.23.6.255</code> is reserved for static hosts. The search domain for this network is <code>core.cghmn</code>.
==== VLAN 8 - Servers (172.23.8.0/22) ====
This VLAN will contain all servers hosted and managed by members, which can be any (retro) service that works across an IP router. For anything that requires direct layer 2 access or the same broadcast domain as the client machines, it is advised to host said server in the Global LAN network. This is the only VLAN clients from the bridged Global LAN network may access freely, so members should be wary about what ports they open up for anyone outside of localhost. Another option is to run a tiny router instance based on OpenWRT in front of your server which will act as a basic firewall and NAT router behind which one can run their servers.
Hosts in this subnet may not access the internet inherently, however a firewall rule is in place that allows specific servers internet access, it is still uncertain if this will make it to the final CGHMN or if this subnet is also supposed to be entirely sealed off from the public internet. During a few chats on the Discord server, the idea of hosting local package mirrors of popular distros and projects was mentioned so that both modern and retro systems won't need to connect to internet servers for package installations and upgrades. Hosts may access the router for DNS, NTP and ICMP queries and query DNS lookups at the legacy DNS server at <code>172.23.4.104</code>, other internal connections are prohibited.
Addresses are handed out via DHCP by the router in the range <code>172.23.11.1-172.23.11.254</code>, the range <code>172.23.8.11-172.23.10.255</code> is reserved for static hosts. The search domain for this network is <code>hosting.retro</code>.
==== VLAN 12 - DMZ (172.23.12.0/22) ====
Currently not in use.
=== Containers and VMs ===
Containers and VMs on the Proxmox host are currently assigned in the 10000 ID range to keep clear of existing VMs.
There is one VM and three containers at the time of writing this:
==== VM 10001 (demo-chhmn-router) ====
This is the OPNsense VM running as the primary router, firewall, DHCP server and Wireguard endpoint for the demo network. Its login credentials are currently in the paws of Snep, as I'm still unsure where any passwords for the CGHMN are going to be stored safely and with proper access rights.
The router has the first IP in any of the available demo network subnets and responds to IPv4 and IPv4 ICMP packets, DNS queries to its local Unbound resolver and NTP sync requests to the built-in NTP server.
Unbound currently resolves all requests it cannot resolve locally recursively against the internet root servers and returns those replies to clients, this may be subject to change as we potentially plan on sealing the network off more. It is configured to forward all requests with a TLD of <code>.cghmn</code> and <code>.retro</code> to the internal DNS root server.
The Wireguard endpoint servers as the connection into the CGHMN from the outside internet on <code>66.170.190.194:42070</code> for anyone that wishes to parttake the network. See [[Signup]] for more details on how to join.
==== Container 10401 (demo-cghmn-root-dns, VLAN4, 172.23.4.101) ====
This container, based on the absolutely tiny-footprinted Alpine image, hosts the BIND-based root DNS server for the internal CGHMN domains <code>.retro</code> and <code>.cghmn</code> together with the reverse DNS zone for the 172.23.0.0 network. It lives in the Core Services subnet and is reachable on port 53 for DNS queries from every other internal subnet. Zones are configured in the zone files under <code>/etc/bind/zones</code> and loaded by the zone blocks in the <code>/etc/named.conf</code> file.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10401</code> on the Proxmox host console.
==== Container 10402 (demo-cghmn-ca, VLAN4, 172.23.4.102) ====
This container, also based on Alpine, is hosting the custom Certificate Authority based on OpenSSL created and self-signed certificate files. It is currently constructed in a Root CA -> Intermediate CA -> Server Certificates structure, where the CA signed certificates of the intermediate CA, which then signs all certificates requested for servers and clients on the network. Clients thus should only need to install the CA certificate into their trusted keychain to have valid TLS connections to servers using certificates signed by this internal CA.
Clients can access a web server on <code>certs.cghmn:80</code> or <code>172.23.4.102:80</code> via plain HTTP to download the root CA and intermediate CA certificate files for installation on their retro machines. Note: This is not meant to be secure. When you add this root CA, we could pretend to be any server on the internet under any domain and any system that has the root CA or intermediate CA certificate installed will trust it. Don't add this on machines you would have personal data on or that you would let onto the public internet!
The /root directory of this container contains a script called <code>create-and-sign-server-csr.sh</code> that, when run without any arguments, will ask a few questions on the command line and generate a signed TLS certificate in the root directory for the specified DNS names to make deployment of new TLS certificates a little easier. This requires the password of the private key of the intermediate CA, which again is currently stored in Sneps password manager but of course will be copied to a safe location to store passwords once available for the CGHMN.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10402</code> on the Proxmox host console.
==== Container 10403 (demo-cghmn-vxlan-endpoint, VLAN4, 172.23.4.103) ====
This container, another Alpine instance, connects all the VXLAN clients together under one virtual Linux bridge and is constructed with a couple if-up/if-down scripts and a Bash script to create new tunnels at <code>/opt/vxlan-scripts/create-vxlan-interface.sh</code>.
This script, when called like for example so: <code>create-vxlan-interface.sh 100.89.128.90</code> will do the following:
# Find the first unused VXLAN ID
# Output the VXLAN ID for configuring a new VXLAN tunnel on the client side
# Add an interface configuration to <code>/etc/vxlan-interfaces/</code> which is sourced by ifupdown
# Bring up that new VXLAN interface, which bridges it to the Global LAN bridge
after which the client with IP 100.89.128.90 can connect a VXLAN tunnel with the newly added VXLAN ID to their router and join the network.
This is still a very manual process, though one which will probably become more streamlined in the future of the CGHMN network, perhaps with some APIs and/or custom OpenWRT web interface *wink wink*.
This container is only reachable by the firewall itself and by the clients connecting their VXLAN bridge to port 4789 from the Wireguard tunnel, as it doesn't do any routing or hosting of services directly aside from the VXLAN endpoint.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10403</code> on the Proxmox host onsole.
==== Container 10404 (demo-cghmn-legacy-dns, VLAN4, 172.23.4.104) ====
This container, based on Alpine, runs a dnsmasq instance configured to look up certain DNS overrides either in the hosts file at <code>/etc/cghmn-dns-overrides</code> or by including a dnsmasq configuration file from <code>/etc/dnsmasq-cghmn.d/*.conf</code>. Any other requests it cannot resolve locally are forwarded to the Unbound DNS resolver running on the OPNsense router VM. This setup is used to create DNS overrides for existing domains to make old software, which is hardcoded to specific DNS entries, work again with custom servers hosted internally.
Currently, there is no root password set, console access works either via key-based SSH or by entering <code>pct enter 10404</code> on the Proxmox host console.
=== Proposed Organization of IDs and IPs ===
My (Sneps) idea behind Proxmox container and VM IDs are as follows:
'''101xx - 103xx''' are for Containers and VMs in the bridged layer 2 network, so any hosts that members want to run in the bridged network directly.
'''104xx - 107xx''' are for Containers and VMs in the Core Services VLAN4, so anything that is necessary for the operation of the CGHMN network.
'''108xx - 111xx''' are for Containers and VMs in the Servers VLAN8, so anything that members would choose to host on the CGHMN Proxmox.
For IPs, I left the first 10 IPs in each subnet reserved for things like routers, for example (perhaps a second router and a virtual IP for failover down the line?).
After that, the first half of the subnet (see above under Network Layout for the actual start and end of this range) is supposed to be reserved for any hosts that are set up with a fully static IP. This is entirely outside of the DHCP range to avoid any conflicts. That DHCP range then starts with the second half of the subnet and goes up to the last available host IP of each subnet.
=== Other Notes ===
* Currently, the advertised DNS server via DHCP is the included Unbound Server on the OPNsense instance. If we want to completely seal off clients and servers from the rest of the internet, we could directly point the clients towards our root DNS server for all requests.
* Currently, the OPNsense router does DHCP as it already has an IP in each VLAN and comes with a solid DHCP server that can also support failover out of the box (ISC DHCP). I (Snep) chose this route over a standalone DHCP server to avoid having a second container/VM in each subnet that solely does DHCP or DHCP proxying, mainly to keep the setup and maintenance work as low as possible.
* A customized OpenWRT image for the Gl.iNet MT300n and AR300n are currently being built and tested, which includes required packages and UCI configurations out of the box to make joining the network perhaps a little bit easier. Will update this page or create a new one and link to it once a working image exists!
=== Reserved static IPs ===
* '''VLAN1, 172.23.0.11:''' WIREGUARD-EXTERNAL (CursedSilicon)
90a7e47f08fdfc87c034630ad5d226d675e48b55
CGHMN 1.0
0
79
169
141
2025-05-11T02:33:13Z
Ilostmybagel
3
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
== Tracking sheet for "what would we want in a general 1.0 release" ==
Let's break these down by user just to keep division of labor easy
=== CursedSilicon suggestions ===
The main blocker currently is access to reliable fiber at /dev/hack. Gaining that should give us ample bandwidth to start allowing broader user access to the network generally
Maybe invite a selection of "retro networking" youtube folks (TheSerialPort, ClabRetro, etc) to help tire kick things? Serena also suggested federation of retro network service providers, so this could be a useful step.
3be1831751723b6f82f45dcc70ff5f9bdddfdf5d
Signup
0
75
171
124
2025-05-11T02:36:13Z
Ilostmybagel
3
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
So! You want to be a member of CompuGlobalHyperMegaNet?
Excellent! Here's how you sign up
Firstly you'll need to join the [https://discord.gg/TnpSG2P677 Cursed Silicon Discord].
Ping one of our Mod staff and request access to the '''#compu-global-hyper-mega-net''' channel
After you've been granted access to the channel, @compu-global-hyper-mega-net and let us know what you'd like to build or run. A few helpful specifics
* Do you have Systems Admin/Network Admin skills? Do you need help with the stuff you'd like to run?
* Are you volunteering as a single user or are you participating as part of a group?
* Are you intending to use CGHMN's hosting, or do you want to simply attach your own retro hardware to the network?
* What are the best ways we can contact you (usually just in case anything breaks)
Once that's all sorted we'll help you get your project off the ground and running on the network as best we can.
Once it's up and running though please keep in mind '''you will be responsible for maintaining it'''
757860e6fc61288167d00584484155a565339547
172
171
2025-05-12T09:05:06Z
CursedSilicon
1
Reworded things, added IRC
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
So! You want to be a member of CompuGlobalHyperMegaNet?
Excellent! Here's how you sign up
Firstly you'll need to either join the [https://discord.gg/TnpSG2P677 Cursed Silicon Discord].or connect to the IRC @ '''irc.cursedsilicon.net:6667''' and join channel '''#cghmn'''
For '''Discord''' users, please @ the mod team and you'll be assigned the relevant user role.
After you've been granted access to the channel llet us know what you'd like to build or run. A few helpful specifics
* Do you have Systems Admin/Network Admin skills? Do you need help with the stuff you'd like to run?
* Are you volunteering as a single user or are you participating as part of a group?
* Are you intending to use CGHMN's hosting, or do you want to simply attach your own retro hardware to the network?
* What are the best ways we can contact you (usually just in case anything breaks)
Once that's all sorted we'll help you get your project off the ground and running on the network as best we can.
Once it's up and running though please keep in mind '''you will be responsible for maintaining it!''' We provide network access (and infrastructure hosting) but can't run your pet project for you!
367d95b88f8b4d72b6c9b0c43d5290b773bd7b18
File:Example Certificate Script Run.png
6
86
174
2025-05-15T20:09:27Z
Snep
5
wikitext
text/x-wiki
Terminal output of the Root CA Certificate creation script showing the domain example.retro receiving a certificate
968f97e2757881f995ee3ebe25ec6e671cd20023
CGHMN Certificate Authority
0
87
175
2025-05-15T20:10:02Z
Snep
5
Created page
wikitext
text/x-wiki
=== The CGHMN Certificate Authority ===
... is used to create internal certificates for old SSL and TLS applications with our custom domains .cghmn and .retro, which cannot receive actual, real world publicly trusted certificates.
To trust those certificates, navigate to http://certs.cghmn, download the Root CA certificate and install it into your operating systems root CA store.
'''WARNING:''' Only do this on retro machines that are attached to the CGHMN, don't do this on modern machines with data you care for and websites you'd rather not have potentially [[wikipedia:Man-in-the-middle_attack|MITM]]'ed. Installing and trustig the Root CA certificate would allow us (or anyone that has access to the root CA public and private keys together with the signing password) to create whatever certificate we like for any domain name out there and fool your OS into thinking it can trust that self-signed certificate.
Alternatively, you can always just click "Trust this page" or similar in your web browser and most applications that rely on SSL/TLS have some option to disable CA checking.
=== How to obtain a certificate for your .cghmn or .retro domain ===
If you'd like a certificate for your CGHMN internal domain, ping one of the admins in the Discord channel and pass along the following infos:
* Domain Name: The domain you'd like to receive a certificate for
* How to best send you your certificate, e.g. Discord DMs, E-Mail, some Messenger, Filesharing service etc., best not through a public channel
* Optionally:
** If you want a wildcard certificate, i.e. one certificate for the domain above and all subdomains underneath that domain (e.g. *.example.org)
** If you'd like the private key to be protected with a randomly generated password
** What two letter code to fill into the "Country" field of the certificate, default is "XX"
** What to fill into the "State or Province" field of the certificate, default is "Global"
** What to fill into the "Locality" field of the certificate, defaut is "The Internet"
** What to fill into the "Organization Name" field of the certificate, default is "Compu Global Hyper Mega Network"
** What to fill into the "Organizational Unit" field of the certificate, default is your username
** What to fill into the "E-Mail" field of the certificate, default is "complain@mail.cghmn"
** ''All of the above can be freely chosen and be whatever you like''
Then we'll create the certificate, private key and full chain certificate and send it over so you can install it into whatever service you like!
=== How to generate a certificate - For CGHMN Admins ===
[[File:Example Certificate Script Run.png|thumb|Script Example Output]]
To generate a members' certificate, <code>ssh</code> or <code>pct enter</code> into Container <code>10402</code> with IP address <code>172.23.4.102</code>. In the root directory should be a Bash script called <code>create-and-sign-server-csr.sh</code>, run it with <code>bash /root/create-and-sign-server-csr.sh</code>.
It will first ask you what the output files should be called, it's best to enter something that associates the file with the target domain or member, e.g. the domain itself or the members' username. It's recommended to only use alpha-numerical characters, dashes, underscores and dots.
Next, you're asked if the key shall be protected with a password. If the member didn't specify or doesn't want one, you can just press '''Enter''' on this step to select the default value of ''not'' using a password. Otherwise type '''y''' and press '''Enter''' to confirm, then generate a random password with a website, tool or password manager of your choice and input said password in the "Enter PEM pass phrase" prompt. The password needs to be at least 4 characters long!
The next step asks you for the hostnames of the certificate. Enter all hostnames you want the certificate to be valid for, e.g. <code>example.retro</code>, <code>www.example.retro</code> and <code>mail.example.retro</code>. If the member requested a wildcard certificate, enter the base domain first, e.g. <code>example.retro</code>, followed by the wildcard domain, e.g. <code>*.example.retro</code>. Once all domain names are entered, press '''Ctrl+D''' to confirm.
If you've specified '''y''' at the question above if the private key should be password protected, you will next be asked to re-enter that password.
Next, you'll be asked for the Common Name, there enter the base domain for which the certificate is valid, e.g. '''example.retro'''.
Then, some certificate options can be set like Country, Organization and E-Mail assigned with the certificate, which are most of the optional details listed above that the member can specify if they like, which does not need to be real data, it can be whatever they like. Otherwise, just press '''Enter''' on the fields to select the predefined default values.
The next password requested from you is the Intermediate CA Signing Password, followed by two confirmations if you really really want to sign the new certificates with our intermediate CA. Input '''y''' and press '''Enter''' both times.
Now the certificate is created and ready for use, the script will tell you into which directory it has written the certificate files.
All that's left to do now is to SCP the files off the CA container and send them over to the member in a secure-ish fashion through their prefered channel. Don't send them in the Discord channel unless they're fine with it since it allows someone else to more easily impersonate their site, not that that's a huge concern in the CGHMN network, but still.
9fde753c6539e3f73c78191bb51128c7c244c80e
CGHMN DNS Information
0
88
177
2025-05-16T00:02:53Z
Talija
10
Initial post, creating to add a summary of the different DNS servers on the network.
wikitext
text/x-wiki
== About this page ==
This page exists to document information about the DNS of CGHMN, and some of the complexities that comes with a DNS infrastructure made of up varying platforms across decades of the protocol's evolution. See [[CGHMN-Demo-Network]] for detailed information about the underlying infrastructure
== DNS Configuration Guide ==
=== Getting Started ===
==== Pointing to the right DNS server ====
CGHMN has several DNS servers in use for differing purposes. The correct default DNS server you should be pointing at while getting started is 172.23.0.1. This is the router, which then forwards the requests to the actual DNS.
==== What the different DNS servers are (or, is this thing on?) ====
CGHMN's DNS is configured such that there are three core servers that perform response modifications to allow the recreation of long defunct services, perform lookups, and act as the root name server for the network, which has two internal TLD (top level domain, like .com or .net) on it.
===== 172.23.4.101 - ns1.cghmn =====
This is the root name server for the .retro and .cghmn TLDs, as well as the 23.172.in-addr.arpa and 96.100.in-addr.arpa reverse lookup zones. This server exists to delegate domains to members of CGHMN, and serve as the name server for the internal network. This server is useful to perform a <code>dig</code> or <code>nslookup</code> against if you want to see if a subdomain has been delegated, for example:
<code>dig ns example.retro. @172.23.4.101</code>
or
nslookup
> server 172.23.4.101
> set type=ns
> example.retro.
This server does not perform lookups. It is currently running BIND.
===== 172.23.4.105 =====
This is the recursive lookup server for the network. It is configured to recursively look up all requests for CGHMN domains, starting with ns1.cghmn, and then moving up based on delegations to member servers. Regular lookups still take place against real TLDs, if something needs to be pulled off the internet. This server is currently running BIND. This server is useful to use <code>dig</code> or <code>nslookup</code> against if you wish to see if your domain is resolving on the network after it has been delegated to you.
<code>dig a test.example.retro. @172.23.4.105</code>
or
nslookup
> server 172.23.4.105
> set type=a
> test.example.retro.
===== 172.23.4.104 - legacydns.cghmhn =====
This is a dnsmasq server that is currently being used to perform modifications to DNS answers, by pulling from a list of servers that need to be faked in order to make old software, such as AIM, work correctly. This server overrides the DNS answer with these responses, so all relevant DNS records need to be added. Please ask if there is a service you would like added to the network that requires this kind of override. Otherwise, it just forwards the questions to the recursive lookup server 172.23.4.105. This server is useful to test against if you are having trouble connecting to a legacy service that utilizes hard coded DNS.
<code>dig cname login.oscar.aol.com.</code>
or
nslookup
> server 172.23.4.104
> set type=cname
> login.oscar.aol.com.
===== 172.23.0.1 =====
This is the core router for the network, which also serves as a DNS forwarding. It is currently forwarding all traffic to legacydns.cghmn, and performs no additional lookups or translation. This server is useful to test against for any purpose.
[[Category:Compu-Global-Hyper-Mega-Net]]
04c4c50845f8a64d30dee8d7f7544fa01be720bb
181
177
2025-05-16T00:27:41Z
CursedSilicon
1
Minor formatting tweak, added info about legacy DNS
wikitext
text/x-wiki
== About this page ==
This page exists to document information about the DNS of CGHMN, and some of the complexities that comes with a DNS infrastructure made of up varying platforms across decades of the protocol's evolution. See [[CGHMN-Demo-Network]] for detailed information about the underlying infrastructure
== DNS Configuration Guide ==
=== Getting Started ===
==== Pointing to the right DNS server ====
CGHMN has several DNS servers in use for differing purposes. '''The correct default DNS server you should be pointing at while getting started is 172.23.0.1'''. This is the router, which then forwards the requests to the actual DNS.
==== What the different DNS servers are (or, is this thing on?) ====
CGHMN's DNS is configured such that there are three core servers that perform response modifications to allow the recreation of long defunct services, perform lookups, and act as the root name server for the network, which has two internal TLD (top level domain, like .com or .net) on it.
===== 172.23.4.101 - ns1.cghmn =====
This is the root name server for the .retro and .cghmn TLDs, as well as the 23.172.in-addr.arpa and 96.100.in-addr.arpa reverse lookup zones. This server exists to delegate domains to members of CGHMN, and serve as the name server for the internal network. This server is useful to perform a <code>dig</code> or <code>nslookup</code> against if you want to see if a subdomain has been delegated, for example:
<code>dig ns example.retro. @172.23.4.101</code>
or
nslookup
> server 172.23.4.101
> set type=ns
> example.retro.
This server does not perform lookups. It is currently running BIND.
===== 172.23.4.105 =====
This is the recursive lookup server for the network. It is configured to recursively look up all requests for CGHMN domains, starting with ns1.cghmn, and then moving up based on delegations to member servers. Regular lookups still take place against real TLDs, if something needs to be pulled off the internet. This server is currently running BIND. This server is useful to use <code>dig</code> or <code>nslookup</code> against if you wish to see if your domain is resolving on the network after it has been delegated to you.
<code>dig a test.example.retro. @172.23.4.105</code>
or
nslookup
> server 172.23.4.105
> set type=a
> test.example.retro.
===== 172.23.4.104 - legacydns.cghmhn =====
This is a dnsmasq server that is currently being used to perform modifications to DNS answers, by pulling from a list of servers that need to be faked in order to make old software, such as AIM, work correctly. This server overrides the DNS answer with these responses, so all relevant DNS records need to be added. The rationale for this is that instead of a user modifying their hosts file (which can be dozens of different DNS addresses long) we can simply return addresses that correspond within the network. Please ask if there is a service you would like added to the network that requires this kind of override. Otherwise, it just forwards the questions to the recursive lookup server 172.23.4.105. This server is useful to test against if you are having trouble connecting to a legacy service that utilizes hard coded DNS.
<code>dig cname login.oscar.aol.com.</code>
or
nslookup
> server 172.23.4.104
> set type=cname
> login.oscar.aol.com.
===== 172.23.0.1 =====
This is the core router for the network, which also serves as a DNS forwarding. It is currently forwarding all traffic to legacydns.cghmn, and performs no additional lookups or translation. This server is useful to test against for any purpose.
[[Category:Compu-Global-Hyper-Mega-Net]]
303ebb8c63406765f2b67913be32a9974ddebdff
182
181
2025-05-16T02:31:05Z
Talija
10
Added hosting your own and weird quirks
wikitext
text/x-wiki
== About this page ==
This page exists to document information about the DNS of CGHMN, and some of the complexities that comes with a DNS infrastructure made of up varying platforms across decades of the protocol's evolution. See [[CGHMN-Demo-Network]] for detailed information about the underlying infrastructure
== DNS Configuration Guide ==
=== Getting Started ===
==== Pointing to the right DNS server ====
CGHMN has several DNS servers in use for differing purposes. '''The correct default DNS server you should be pointing at while getting started is 172.23.0.1'''. This is the router, which then forwards the requests to the actual DNS.
==== What the different DNS servers are (or, is this thing on?) ====
CGHMN's DNS is configured such that there are three core servers that perform response modifications to allow the recreation of long defunct services, perform lookups, and act as the root name server for the network, which has two internal TLD (top level domain, like .com or .net) on it.
===== 172.23.4.101 - ns1.cghmn =====
This is the root name server for the .retro and .cghmn TLDs, as well as the 23.172.in-addr.arpa and 96.100.in-addr.arpa reverse lookup zones. This server exists to delegate domains to members of CGHMN, and serve as the name server for the internal network. This server is useful to perform a <code>dig</code> or <code>nslookup</code> against if you want to see if a subdomain has been delegated, for example:
<code>dig ns example.retro. @172.23.4.101</code>
or
nslookup
> server 172.23.4.101
> set type=ns
> example.retro.
This server does not perform lookups. It is currently running BIND.
===== 172.23.4.105 =====
This is the recursive lookup server for the network. It is configured to recursively look up all requests for CGHMN domains, starting with ns1.cghmn, and then moving up based on delegations to member servers. Regular lookups still take place against real TLDs, if something needs to be pulled off the internet. This server is currently running BIND. This server is useful to use <code>dig</code> or <code>nslookup</code> against if you wish to see if your domain is resolving on the network after it has been delegated to you.
<code>dig a test.example.retro. @172.23.4.105</code>
or
nslookup
> server 172.23.4.105
> set type=a
> test.example.retro.
===== 172.23.4.104 - legacydns.cghmhn =====
This is a dnsmasq server that is currently being used to perform modifications to DNS answers, by pulling from a list of servers that need to be faked in order to make old software, such as AIM, work correctly. This server overrides the DNS answer with these responses, so all relevant DNS records need to be added. The rationale for this is that instead of a user modifying their hosts file (which can be dozens of different DNS addresses long) we can simply return addresses that correspond within the network. Please ask if there is a service you would like added to the network that requires this kind of override. Otherwise, it just forwards the questions to the recursive lookup server 172.23.4.105. This server is useful to test against if you are having trouble connecting to a legacy service that utilizes hard coded DNS.
<code>dig cname login.oscar.aol.com.</code>
or
nslookup
> server 172.23.4.104
> set type=cname
> login.oscar.aol.com.
===== 172.23.0.1 =====
This is the core router for the network, which also serves as a DNS forwarding. It is currently forwarding all traffic to legacydns.cghmn, and performs no additional lookups or translation. This server is useful to test against for any purpose.
== Hosting Your Own DNS Name Server ==
=== About self-hosting ===
CGHMN can host member DNS zones on its nameserver, however it is welcome and even encouraged for them to explore setting up their own DNS name server for their subnet. This can be done with most DNS server software, provided they can be recursively looked up against by BIND. Please note that if you intend to run old Microsoft DNS, you will need to let us know that you are running it, as exceptions to the lookup procedure need to be added to the 172.23.4.105 server.
You will need to reach out to CGHMN and let us know you want to host your domain, and give us the domain, NS record, A record, and IP address of the DNS server.
=== What you need ===
==== A server ====
You will need a computer connected to CGHMN, running a DNS server software that is able to act as an authoritative name server. It will need to have UDP port 53 and TCP port 53 allowed in its firewall. You do not need a lot of power, but it should be fairly reliable as everything will depend on it to find your servers and services.
==== A SOA record ====
You will need a SOA (Start of Authority) record, this is the record that tells other DNS servers "I am in charge of this domain and here is the information about it". This record will need to be pointed to an NS (Name Server) record.
==== A NS record ====
You will need a NS record, this is the record that says "this is where you ask about this domain". This record should point at an A record.
==== An A record ====
You will need an A record, this is the record that maps the name of the DNS server to an IP address. This should be the FQDN (Fully Qualified Domain Name) of the DNS server, and the IP address it is listening to.
==== Summary ====
Your server will need to be configured as an authoritative name server. To do this, it must run a DNS name server software, which should have a zone containing an the SOA, which points at the NS, which points at the A.
== DNS Quirks ==
=== Windows DNS ===
Old Windows DNS servers will misbehave when BIND's recursive lookup server attempts to do a lookup against them, and will end in failure. The way around this is to disable edns lookups against this particular server in the BIND configuration. Bind is supposed to attempt again with edns disabled but it seems with Windows DNS specifically to fail.
=== DNS manipulation with multiple RR types ===
If a record is being looked up, and this record was once an A record, but still exists and is now a CNAME record, you will have an issue where the lookup will work with tools, but fail with actual lookups. This is because the CNAME record being returned from the real DNS server will take precedent over the fake A record. To resolve this issue, you have to fake both the CNAME and the A record.
[[Category:Compu-Global-Hyper-Mega-Net]]
0e7323016f7c3cfb40e8fbe276a844eab9ef83ea
183
182
2025-05-16T06:49:26Z
Snep
5
Added info about default DNS being 100.89.128.0 in the WG tunnel
wikitext
text/x-wiki
== About this page ==
This page exists to document information about the DNS of CGHMN, and some of the complexities that comes with a DNS infrastructure made of up varying platforms across decades of the protocol's evolution. See [[CGHMN-Demo-Network]] for detailed information about the underlying infrastructure
== DNS Configuration Guide ==
=== Getting Started ===
==== Pointing to the right DNS server ====
CGHMN has several DNS servers in use for differing purposes. '''The correct default DNS server you should be pointing at while getting started is 172.23.0.1 from the core network, or 100.89.128.0 from the Wireguard tunnel'''. This is the router, which then forwards the requests to the actual DNS.
==== What the different DNS servers are (or, is this thing on?) ====
CGHMN's DNS is configured such that there are three core servers that perform response modifications to allow the recreation of long defunct services, perform lookups, and act as the root name server for the network, which has two internal TLD (top level domain, like .com or .net) on it.
===== 172.23.4.101 - ns1.cghmn =====
This is the root name server for the .retro and .cghmn TLDs, as well as the 23.172.in-addr.arpa and 96.100.in-addr.arpa reverse lookup zones. This server exists to delegate domains to members of CGHMN, and serve as the name server for the internal network. This server is useful to perform a <code>dig</code> or <code>nslookup</code> against if you want to see if a subdomain has been delegated, for example:
<code>dig ns example.retro. @172.23.4.101</code>
or
nslookup
> server 172.23.4.101
> set type=ns
> example.retro.
This server does not perform lookups. It is currently running BIND.
===== 172.23.4.105 =====
This is the recursive lookup server for the network. It is configured to recursively look up all requests for CGHMN domains, starting with ns1.cghmn, and then moving up based on delegations to member servers. Regular lookups still take place against real TLDs, if something needs to be pulled off the internet. This server is currently running BIND. This server is useful to use <code>dig</code> or <code>nslookup</code> against if you wish to see if your domain is resolving on the network after it has been delegated to you.
<code>dig a test.example.retro. @172.23.4.105</code>
or
nslookup
> server 172.23.4.105
> set type=a
> test.example.retro.
===== 172.23.4.104 - legacydns.cghmhn =====
This is a dnsmasq server that is currently being used to perform modifications to DNS answers, by pulling from a list of servers that need to be faked in order to make old software, such as AIM, work correctly. This server overrides the DNS answer with these responses, so all relevant DNS records need to be added. The rationale for this is that instead of a user modifying their hosts file (which can be dozens of different DNS addresses long) we can simply return addresses that correspond within the network. Please ask if there is a service you would like added to the network that requires this kind of override. Otherwise, it just forwards the questions to the recursive lookup server 172.23.4.105. This server is useful to test against if you are having trouble connecting to a legacy service that utilizes hard coded DNS.
<code>dig cname login.oscar.aol.com.</code>
or
nslookup
> server 172.23.4.104
> set type=cname
> login.oscar.aol.com.
===== 172.23.0.1 =====
This is the core router for the network, which also serves as a DNS forwarding. It is currently forwarding all traffic to legacydns.cghmn, and performs no additional lookups or translation. This server is useful to test against for any purpose.
== Hosting Your Own DNS Name Server ==
=== About self-hosting ===
CGHMN can host member DNS zones on its nameserver, however it is welcome and even encouraged for them to explore setting up their own DNS name server for their subnet. This can be done with most DNS server software, provided they can be recursively looked up against by BIND. Please note that if you intend to run old Microsoft DNS, you will need to let us know that you are running it, as exceptions to the lookup procedure need to be added to the 172.23.4.105 server.
You will need to reach out to CGHMN and let us know you want to host your domain, and give us the domain, NS record, A record, and IP address of the DNS server.
=== What you need ===
==== A server ====
You will need a computer connected to CGHMN, running a DNS server software that is able to act as an authoritative name server. It will need to have UDP port 53 and TCP port 53 allowed in its firewall. You do not need a lot of power, but it should be fairly reliable as everything will depend on it to find your servers and services.
==== A SOA record ====
You will need a SOA (Start of Authority) record, this is the record that tells other DNS servers "I am in charge of this domain and here is the information about it". This record will need to be pointed to an NS (Name Server) record.
==== A NS record ====
You will need a NS record, this is the record that says "this is where you ask about this domain". This record should point at an A record.
==== An A record ====
You will need an A record, this is the record that maps the name of the DNS server to an IP address. This should be the FQDN (Fully Qualified Domain Name) of the DNS server, and the IP address it is listening to.
==== Summary ====
Your server will need to be configured as an authoritative name server. To do this, it must run a DNS name server software, which should have a zone containing an the SOA, which points at the NS, which points at the A.
== DNS Quirks ==
=== Windows DNS ===
Old Windows DNS servers will misbehave when BIND's recursive lookup server attempts to do a lookup against them, and will end in failure. The way around this is to disable edns lookups against this particular server in the BIND configuration. Bind is supposed to attempt again with edns disabled but it seems with Windows DNS specifically to fail.
=== DNS manipulation with multiple RR types ===
If a record is being looked up, and this record was once an A record, but still exists and is now a CNAME record, you will have an issue where the lookup will work with tools, but fail with actual lookups. This is because the CNAME record being returned from the real DNS server will take precedent over the fake A record. To resolve this issue, you have to fake both the CNAME and the A record.
[[Category:Compu-Global-Hyper-Mega-Net]]
397a12b8d3755597133d2ad81e1f616c67aa3c0a
Talk:CGHMN DNS Information
1
89
178
2025-05-16T00:05:35Z
Talija
10
general to-do
wikitext
text/x-wiki
To be added: information about DNS quirks, particularly:
-DNS response alteration setup when records other than an A record are in use
-BIND recursive lookup with old Windows Server
644c199714e495c24df053ca6f162861f947802b
179
178
2025-05-16T00:06:51Z
Talija
10
fixing formatting
wikitext
text/x-wiki
<html>
<body>
<pre>
To be added: information about DNS quirks, particularly:
-DNS response alteration setup when records other than an A record are in use
-BIND recursive lookup with old Windows Server
</pre>
</body>
</html>
f3a894308fb7c168d85c844d2e48ba4ba7e6a406
180
179
2025-05-16T00:07:09Z
Talija
10
one last fix...
wikitext
text/x-wiki
<pre>
To be added: information about DNS quirks, particularly:
-DNS response alteration setup when records other than an A record are in use
-BIND recursive lookup with old Windows Server
</pre>
57c4bd2d56ac217e0419e0557caf4dab1ac4e14d
AIM Clients
0
90
196
2025-06-03T02:09:15Z
CursedSilicon
1
Created page with "This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested Currently testing is done under Ubuntu 5.04 (i386) because 4.10 had weird SMP issues in Proxmox This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But just act as a guide TESTED WORKING - gAIM"
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Currently testing is done under Ubuntu 5.04 (i386) because 4.10 had weird SMP issues in Proxmox
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But just act as a guide
TESTED WORKING
- gAIM
7c441bc819b90ff917fd1449ff6d5f15d23edc3c
197
196
2025-06-03T02:30:13Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Currently testing is done under Ubuntu 5.04 (i386) because 4.10 had weird SMP issues in Proxmox
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But just act as a guide
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
'''Older clients presumably work but are untested'''
'''<u>iChat ??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox</u>'''
=== Linux ===
gAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. Bug filed
3ce40ed6693a85e0720b2dbce87b03e3242920fd
198
197
2025-06-03T04:07:20Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Currently testing is done under Ubuntu 5.04 (i386) because 4.10 had weird SMP issues in Proxmox
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But just act as a guide
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works!
Adium 1.3.10 (x86) works!
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
=== Linux ===
gAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some strange reason?
== TESTED '''NOT''' WORKING ==
'''Windows'''
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - Packet dump available here
'''Mac'''
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - Packet dump available here
'''Linux'''
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - Packet dump available here
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - Packet dump available here
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - Packet dump available here
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - Packet dump available here
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
f84ce06a958974c8ea8558c06230c166c9fd8928
199
198
2025-06-03T04:12:24Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Currently testing is done under Ubuntu 5.04 (i386) because 4.10 had weird SMP issues in Proxmox
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But just act as a guide
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
=== Linux gAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed] ===
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some strange reason?
== TESTED '''NOT''' WORKING ==
'''Windows'''
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - Packet dump available here
'''Mac'''
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - Packet dump available here
'''Linux'''
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - Packet dump available here
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - Packet dump available here
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - Packet dump available here
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - Packet dump available here
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
85a19a935d2ec0627315f5db4d654a9d1818b07b
200
199
2025-06-03T04:14:22Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Currently testing is done under Ubuntu 5.04 (i386) because 4.10 had weird SMP issues in Proxmox
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
=== Linux ===
gAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
'''Windows'''
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - Packet dump available here
'''Mac'''
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - Packet dump available here
'''Linux'''
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - Packet dump available here
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - Packet dump available here
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - Packet dump available here
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - Packet dump available here
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
25276be6e7bf103916abb7a85395c467bfdbb446
201
200
2025-06-03T04:14:52Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Currently testing is done under Ubuntu 5.04 (i386) because 4.10 had weird SMP issues in Proxmox
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
=== Linux ===
gAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
'''Windows'''
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - Packet dump available here
'''Mac'''
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - Packet dump available here
'''Linux'''
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - Packet dump available here
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - Packet dump available here
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - Packet dump available here
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - Packet dump available here
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
8e4c4f4583b19c1c29aabf134d9648300d75f908
202
201
2025-06-03T05:33:15Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Currently testing is done under Ubuntu 5.04 (i386) because 4.10 had weird SMP issues in Proxmox
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
=== Linux ===
gAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
'''Windows'''
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Mac'''
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Linux'''
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
8c556d1b30436e9bfd3f853614744dd4e6f23f6d
203
202
2025-06-03T05:38:06Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
=== Linux ===
gAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
'''Windows'''
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Mac'''
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Linux'''
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
9e18b668a65b3908683ffa858eaef2f7df65ae02
204
203
2025-06-03T05:40:06Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
'''All testing was performed on [[Compu-Global-Hyper-Mega-Net|CGHMN]] to simplify packet captures. IP addresses do not reflect the ones used by regular RAS clients'''
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
=== Linux ===
gAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
'''Windows'''
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Mac'''
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Linux'''
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
1a0fc13f351f621bc2dd4aa0c528c25af5351d35
205
204
2025-06-03T21:32:13Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
'''All testing was performed on [[Compu-Global-Hyper-Mega-Net|CGHMN]] to simplify packet captures. IP addresses do not reflect the ones used by regular RAS clients'''
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
iChat on OS X Leopard (PPC or x86 unspecified) works!
AIM for OS 9 (PPC) works!
=== Linux ===
gAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
'''Windows'''
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Mac'''
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Linux'''
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
9ff15546607e5440ccdc7e79e85bd4ff24ae0980
206
205
2025-06-05T04:23:40Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
'''All testing was performed on [[Compu-Global-Hyper-Mega-Net|CGHMN]] to simplify packet captures. IP addresses do not reflect the ones used by regular RAS clients'''
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
iChat on OS X Leopard (PPC or x86 unspecified) works!
AIM for OS 9 (PPC) works!
=== Linux ===
GAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
'''Windows'''
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Mac'''
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Linux'''
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
3211fe93720e170b9d8e9bd16079378d032573d8
CGHMN-IP-Allocations
0
77
208
207
2025-06-06T09:01:35Z
CursedSilicon
1
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| Unknown
|100.89.128.10
|100.96.10.0/24
| -
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
d753dc998cb860c3ec742ff4e6b8f393949ddb82
214
208
2025-06-12T19:25:03Z
Gothpanda
12
Edited member information
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
7b2acd725139c301d091677ff6b0700f7c5cca19
215
214
2025-06-14T20:27:08Z
Loganius
6
Add my media server to IP allocations
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|''kira.loganius.retro''
|172.23.0.52
|DNS not set up yet.
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
0f52909ac5b5f7efeb33426363d784f0005e14db
216
215
2025-06-14T20:29:37Z
Loganius
6
DNS for kira.loganius.retro is now online.
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
8a77c97859377d1e2030c9ad61b43142485f5ada
217
216
2025-06-15T06:00:45Z
Snep
5
Added cursed's mail server IP dibs
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
edeb43f52860954b1ad1cdb6cbc8bf3bb6e93fb2
224
217
2025-06-24T18:19:33Z
Loganius
6
Add documentation for a couple allocations that were never added to the wiki.
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
49ef639f9ec30750205f6500c019420e4fdec993
225
224
2025-06-24T18:32:24Z
Loganius
6
Added Spaztron's domain
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|''Spaztron64''
|''arcesia.retro''
|''Unknown''
|''100.96.17.105''
|Something is wrong with the DNS atm, but adding this so it isn't forgotten.
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
54726eb67055cd7936936d99aeae1f840109a6e3
226
225
2025-06-24T21:49:10Z
Loganius
6
we figured out who owns what IPs :D
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|''Spaztron64''
|''arcesia.retro''
|''Unknown''
|''100.96.17.105''
|Something is wrong with the DNS atm, but adding this so it isn't forgotten.
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
5c8cb7fa4f3d4dbd091cc264d200de035436962e
227
226
2025-06-24T22:22:32Z
Loganius
6
Added Nicuuut's delegated domain and CGHMN services
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|''Spaztron64''
|''arcesia.retro''
|''Unknown''
|''100.96.17.105''
|Something is wrong with the DNS atm, but adding this so it isn't forgotten.
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|103
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|124
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
f2376fedf7afa5306b2d40db5b9394fc36b582f5
228
227
2025-06-24T22:23:45Z
Loganius
6
fixed VM IDs for Nicuuut
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|''Spaztron64''
|''arcesia.retro''
|''Unknown''
|''100.96.17.105''
|Something is wrong with the DNS atm, but adding this so it isn't forgotten.
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
e1c8b31aaf534190a2bcdc5de7fa39395130fe70
230
228
2025-06-25T21:47:42Z
Loganius
6
Add oohay.retro to the list of delegated domains
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|''Spaztron64''
|''arcesia.retro''
|''Unknown''
|''100.96.17.105''
|Something is wrong with the DNS atm, but adding this so it isn't forgotten.
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
54b8055e5569d5493ba1841576d9a8d8f1eaefb3
232
230
2025-06-26T01:14:04Z
Loganius
6
Added 404.retro to the member delegated domains
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|''Spaztron64''
|''arcesia.retro''
|''Unknown''
|''100.96.17.105''
|Something is wrong with the DNS atm, but adding this so it isn't forgotten.
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|''Harry''
|''404.retro''
|''ns.404.retro''
|''100.96.18.254''
|No DNS server on the member side yet.
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
e7ec85e55ed004afd254283a0438b9b0127af97d
233
232
2025-06-26T03:30:29Z
Loganius
6
arcesia.retro is now online
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|''Harry''
|''404.retro''
|''ns.404.retro''
|''100.96.18.254''
|No DNS server on the member side yet.
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
56525602cd9bb0a39df74d21aa54ce1575967010
234
233
2025-06-27T06:41:19Z
Loganius
6
404.retro is now online
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
4a260d7256f9d75d2896677d3bc3a9b02aa1cf20
238
234
2025-07-03T00:38:43Z
CursedSilicon
1
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
ec062330edb514a7c3a48e75418c009416760958
239
238
2025-07-11T01:27:13Z
Gothpanda
12
Adding GothPanda to delegated domains and proxmox server
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
10440cb798bc0735991729150c27b242f96a4421
249
239
2025-07-13T19:38:26Z
Loganius
6
Add AskMe to the list of member delegated domains
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|hugh.loganius.retro
|100.96.9.100
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
d55c08adc55a8d5599dba978a688413f9f3f5e67
AIM Clients
0
90
209
206
2025-06-10T02:46:56Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
'''All testing was performed on [[Compu-Global-Hyper-Mega-Net|CGHMN]] to simplify packet captures. IP addresses do not reflect the ones used by regular RAS clients'''
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
iChat on OS X Leopard (PPC or x86 unspecified) works!
AIM for OS 9 (PPC) works!
=== Linux ===
GAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
'''Windows'''
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Mac'''
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
'''Linux'''
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
1d3481114f73d91e8d888c0ccfd181927d64fd9f
210
209
2025-06-10T02:52:25Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
'''All testing was performed on [[Compu-Global-Hyper-Mega-Net|CGHMN]] to simplify packet captures. IP addresses do not reflect the ones used by regular RAS clients'''
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
iChat on OS X Leopard (PPC or x86 unspecified) works!
AIM for OS 9 (PPC) works!
=== Linux ===
GAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
=== Windows ===
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Mac ===
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Linux ===
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== AmigaOS/MorphOS ===
nAIM 0.11.8.3.1 for AmigaOS - Also connects to its own TOC server '''(toc.n.ml.org)''' (DNS patched already previously for testing) but fails to connect similar to Linux client. Client did not produce any log files. [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
4a566f7c4766bbb9fd05cbb5b216c5461ec84b19
211
210
2025-06-10T04:14:02Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
'''All testing was performed on [[Compu-Global-Hyper-Mega-Net|CGHMN]] to simplify packet captures. IP addresses do not reflect the ones used by regular RAS clients'''
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 3.1.9 on OS X 10.4.11 (Tiger) PPC works!
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
iChat on OS X Leopard (PPC or x86 unspecified) works!
AIM for OS 9 (PPC) works!
=== Linux ===
GAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
=== Windows ===
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Mac ===
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
AIM 4.7 on MacOS 9.2.2 - Complains about incorrect Username/Password. [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Linux ===
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== AmigaOS/MorphOS ===
nAIM 0.11.8.3.1 for AmigaOS - Also connects to its own TOC server '''(toc.n.ml.org)''' (DNS patched already previously for testing) but fails to connect similar to Linux client. Client did not produce any log files. [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
3a15a415cc1ad6243f6f8dc942697d297d32c473
212
211
2025-06-10T04:27:00Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
'''All testing was performed on [[Compu-Global-Hyper-Mega-Net|CGHMN]] to simplify packet captures. IP addresses do not reflect the ones used by regular RAS clients'''
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 3.1.9 on OS X 10.4.11 (Tiger) PPC works!
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
iChat on OS X Leopard (PPC or x86 unspecified) works!
AIM 4.7 for OS 9 (PPC) works!
=== Linux ===
GAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
=== Windows ===
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Mac ===
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Linux ===
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== AmigaOS/MorphOS ===
nAIM 0.11.8.3.1 for AmigaOS - Also connects to its own TOC server '''(toc.n.ml.org)''' (DNS patched already previously for testing) but fails to connect similar to Linux client. Client did not produce any log files. [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
4b21299dabca897850c9e94006db68ececdf7c9d
213
212
2025-06-10T21:16:50Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
'''All testing was performed on [[Compu-Global-Hyper-Mega-Net|CGHMN]] to simplify packet captures. IP addresses do not reflect the ones used by regular RAS clients'''
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 3.1.9 on OS X 10.4.11 (Tiger) PPC works!
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
iChat on OS X Leopard (PPC or x86 unspecified) works!
AIM 4.7 for OS 9 (PPC) works!
=== Linux ===
GAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
=== Windows ===
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Mac ===
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Linux ===
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== AmigaOS/MorphOS ===
nAIM 0.11.8.3.1 for AmigaOS - Also connects to its own TOC server '''(toc.n.ml.org)''' (DNS patched already previously for testing) but fails to connect similar to Linux client. Client did not produce any log files. [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
AmiAIM 0.11 for AmigaOS. Fails to connect, invalid username/password error. [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
f3865ad6f4919baee5126278f39e7a55ec21f318
235
213
2025-06-27T22:43:42Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
'''All testing was performed on [[Compu-Global-Hyper-Mega-Net|CGHMN]] to simplify packet captures. IP addresses do not reflect the ones used by regular RAS clients but CGHMN is connected to ChivaNet/RAS'''
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s. AIM 1.7 refuses to install (requires Win95) but may also work under 3.11 with some tweaking (untested)
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 3.1.9 on OS X 10.4.11 (Tiger) PPC works!
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
iChat on OS X Leopard (PPC or x86 unspecified) works!
AIM 4.7 for OS 9 (PPC) works!
=== Linux ===
GAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
=== Windows ===
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Mac ===
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
AIM 2.1.302 - Queries '''clienturls.aol.com AND aoldiag.aol.com''' (fixed). Attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
AIM 2.2.439 - Queries '''kdc.uas.aol.com''' (fixed) Attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Linux ===
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== AmigaOS/MorphOS ===
nAIM 0.11.8.3.1 for AmigaOS - Also connects to its own TOC server '''(toc.n.ml.org)''' (DNS patched already previously for testing) but fails to connect similar to Linux client. Client did not produce any log files. [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
AmiAIM 0.11 for AmigaOS. Fails to connect, invalid username/password error. [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
c72115651784a1ad913dd63421651da24653bc38
236
235
2025-06-28T04:11:47Z
CursedSilicon
1
wikitext
text/x-wiki
This is just a scratch page for me to send the Retro AIM Server project on supported 3rd party AIM clients I've tested
Windows testing is done on a Windows XP (32-bit) virtual machine with all updates applied
Mac testing is done on OS X 10.6.8 via Proxmox
Linux testing is done on Ubuntu 5.04 (32-bit) via Proxmox but may be augmented in future with different distros
'''All testing was performed on [[Compu-Global-Hyper-Mega-Net|CGHMN]] to simplify packet captures. IP addresses do not reflect the ones used by regular RAS clients but CGHMN is connected to ChivaNet/RAS'''
This test isn't likely to be 100% coverage because I'm not going to test *every build* of every client. But should give users a general direction for further testing
Submissions are also welcome. Please feel free to email me or send me a message on Mastodon
== TESTED WORKING ==
=== Windows ===
Regular AIM. Pretty much all of these up to 6.1 (at time of writing) are tested and working. 6.1 should work on everything from Windows 9x/NT 4.0 through to Windows 11
AIM 1.5 also works on Windows 3.11 with Win32s
=== Mac ===
Adium X 1.0.6 (x86) works! (PPC untested but presumed working)
Adium 1.3.10 (x86) works! (PPC untested but presumed working)
iChat 3.1.9 on OS X 10.4.11 (Tiger) PPC works!
iChat 5.0.3 on OS X 10.6.8 (Snow Leopard) x86 works!
iChat on OS X Leopard (PPC or x86 unspecified) works!
AIM 4.7 for OS 9 (PPC) works!
=== Linux ===
GAIM 1.1.4 (Ubuntu 5.04) works. Though users will show as offline to other client(s) for several minutes. [https://github.com/mk6i/retro-aim-server/issues/123#issuecomment-2933138905 Bug filed]
TiK 0.90 (Ubuntu 5.04) works! Though needs to be run as root for some reason?
== TESTED '''NOT''' WORKING ==
=== Windows ===
Miranda 0.10.80 - Queries '''slogin.oscar.aol.com''' (fixed) but fails to connect. No errors printed by the client. Client also corrupts its database file if exited and relaunched - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Mac ===
Adium 1.4.5 - Queries '''api.screenname.aol.com''' (fixed) and attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
AIM 2.1.302 - Queries '''clienturls.aol.com AND aoldiag.aol.com''' (fixed). Attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
AIM 2.2.439 - Queries '''kdc.uas.aol.com''' (fixed) Attempts to connect over HTTPS. Fails due to no SSL support currently - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== Linux ===
Ayttm 0.4.6-26 - Fails to connect to '''toc.oscar.aol.com''' (fixed) then returns 400 bad request from Nginx(?) - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Centreicq 4.13.0 - I have no goddamn idea how to use this client. But it seems to do...something? then eventually just shows '''[aim] disconnected''' - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
Kopete 0.10 - Attempts to connect but never completes. No errors reported from client - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
naim 0.11.7.2 - '''Seems to connect to its own TOC server toc.n.ml.org (???)''' (fixed) but fails to connect. Client logging enabled but did not produce any log files - [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
=== AmigaOS/MorphOS ===
nAIM 0.11.8.3.1 for AmigaOS - Also connects to its own TOC server '''(toc.n.ml.org)''' (DNS patched already previously for testing) but fails to connect similar to Linux client. Client did not produce any log files. [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
AmiAIM 0.11 for AmigaOS. Fails to connect, invalid username/password error. [https://cursedsilicon.net/aim-packet-dumps/ Packet dump available here]
== UNTESTED ==
Adium X 0.89.1 - Fails to launch on OS X 10.6.8 (x86)
iChat v??? on OS X 10.7 (Lion) was the final client revision is currently untested as I cannot get it to successfully boot under Proxmox
Finch - Seems to be a plugin for Pidgin(?) to enable text mode chat instead of using a GUI?
Instantbird - Originally a Pidgin plugin. Later became its own stand-alone client. Development halted in 2013(?) with download servers unavailable. Downloaded final v1.5 via 3rd party FTP server but was unable to launch due to missing dependencies on Ubuntu 5.04
Jitsi - Cannot find old versions. Application seems to be more geared toward SIP and video conferencing?
Messages - Beta version was released for OS X '''''10.7''''' which I can't run under Proxmox currently
Quiet Internet Pager - Seems like possible malware? Judging by the quality of its Wikipedia page. Final version also was for PDA's instead of Windows(???)
TNT - Probably works? Last updated in 2006 and claims to support the "TOC2 protocol" (OSCAR?). But it's an '''''Emacs''''' client. I don't know how to use Emacs, let alone add AIM to it
VSide. Looks like a weird...SecondLife knockoff? Development halted in 2018 but it was never a messaging client. Just had AIM support attached to it
bae16ccc28c089dec507178a7ab050311d81f49e
How to Get Connected
0
82
218
194
2025-06-24T07:48:26Z
Theothertom
11
Add link to services page
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
This is a quick and dirty "how do I get on CGHMN"
'''Since the service is in "closed beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation'''
=== Step 1: ===
[[Signup|'''Let us know you'd like to connect!''']]
(We'll need information from you such as your Wireguard Pubkey to let you connect to the network)[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router: <code>wget https://cghmn.snep.zip/connect.sh</code>
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server. If you cannot copy-paste, for example, because you're on a VM VNC console, you can run <code>ash setup-cghmn.sh pubkey-qr</code> to get a QR code printout of your public key, which can be scanned with a phone, tablet or software QR code parser to get the key as copy-pastable text.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get Connected - Manually (Linux, Wireguard only, GRETAP follows shortly) ===
In case you want to setup a connection into the network manually, here are the required steps and information you should be needing:
* Generate a Wireguard private key and public key, this command writes a fresh Wireguard private key to <code>private-key</code> and the corresponsing public key to <code>public-key</code>:
$ wg genkey | tee private-key | wg pubkey > public-key
* NEVER share your private key, even with us! It should never be required outside of your own Wireguard setup!
* You will, however, need to share your public key with us. Send CursedSilicon or Snep on the Discord or via IRC a message including the public key and we'll add you to the tunnel.
* In return, you'll get two IP addresses from us: Your tunnel IP address, with which your router talks to our router, and a routed subnet, from which you can assign IPs to your own machines so they can talk to other CGHMN member devices on the network without NAT in the way.
* Next, you'll need to fill a Wireguard configuration file with the two IP addresses, like below:
[Interface]
PrivateKey = <Your private key goes here>
Address = <Your tunnel IP address goes here>/32
DNS = 100.89.128.0
MTU = 1420
[Peer]
PublicKey = k/QiJIbMakMKgTCHVt8/D+8k4DzRVM6U33F3gMZfRUg=
Endpoint = wg-admin.cursedsilicon.net:42070
AllowedIPs = 172.23.0.0/16, 100.89.128.0/22, 100.96.0.0/13
PersistentKeepalive = 15
* Save this file as <code>wg-cghmn.conf</code>, for example.
* Then, run <code>wg-quick up ./wg-cghmn.conf</code>, perhaps requiring <code>doas</code>/<code>sudo</code>, to bring the tunnel up and connect to the network!
This should bring whatever system you've set the tunnel up on onto the network and is now reachable for other members on the network, as long as the firewall on your device is congfigured accordingly, of course.
<nowiki>#</nowiki>TODO: Add example of routed subnet configuration, perhaps on a different Wiki site
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do '''either one''' '''(not both!)''' of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
# Rember to add the member and their tunnel and subnet IPs to the [[CGHMN-IP-Allocations|IP allocations page]] :)
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
=== After you get connected ===
There are a few optional things you might want to do.
==== Network mailing list ====
There is a mailing list you can subscribe to if you want to be notified about things that may affect CGHMN or core services. You can subscribe to the list here: https://berwick-upon-tweed.cobaltqu.be/postorius/lists/cghmn-announce.lists.cobaltqu.be/.
If you need to post to the list, you will need to subscribe before you can be added to the list of poster.
==== Explore things available on the network ====
There is a collection of [[services people are running]] - things like email/hosting/chat/search/etc.
668956e82842ca491f334f9b6511b8aa5acf4e2e
Services people are running
0
91
219
2025-06-24T08:32:24Z
Theothertom
11
Created page with "This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services! == Chat == === AIM === CGHMN connects to Chivanet's AIM service. To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network. === IRC === Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord..."
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service. To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN mail ===
(I forgot the URL). This is run by the core team.
Webmail: available - targets IE5 on Windows 3.1 as a minimum.
IMAP: ???
POP: ???
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/Mailing lists
|}
How to sign up: message theothertom on IRC.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
== Search ==
=== Oohay ===
Available on oohay.retro.
Indexing approach: Must submit pages for indexing
7b257de323b8b54870c55f187943e1e2797f763d
220
219
2025-06-24T08:37:00Z
Theothertom
11
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service. To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN mail ===
(I forgot the URL). This is run by the core team.
Webmail: available - targets IE5 on Windows 3.1 as a minimum.
IMAP: ???
POP: ???
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/Mailing lists
|}
How to sign up: message theothertom on IRC.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on oohay.retro.
Indexing approach: Must submit pages for indexing
e0b5b29b20070317729da72ef5b59a21778c0bcc
221
220
2025-06-24T08:37:31Z
Theothertom
11
/* Theotherhost */
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service. To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN mail ===
(I forgot the URL). This is run by the core team.
Webmail: available - targets IE5 on Windows 3.1 as a minimum.
IMAP: ???
POP: ???
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
How to sign up: message theothertom on IRC.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on oohay.retro.
Indexing approach: Must submit pages for indexing
087a55cb1df23c22428e9614cdb399a146150e0c
222
221
2025-06-24T08:44:04Z
Theothertom
11
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service. To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN mail ===
(I forgot the URL). This is run by the core team.
Webmail: available - targets IE5 on Windows 3.1 as a minimum.
IMAP: ???
POP: ???
== Game servers ==
This feels like a category where adding TODOs is particularly encouraged?
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
How to sign up: message theothertom on IRC.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on oohay.retro.
Indexing approach: Must submit pages for indexing
c9ce0b7d633d6b9b4459fc90111ae4d88044dee4
223
222
2025-06-24T09:30:38Z
Theothertom
11
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service. To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN mail ===
cghmn-mail.retro. This is run by cursedsilicon.
Webmail: available - targets IE5 on Windows 3.1 as a minimum.
IMAP: ???
POP: ???
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
This feels like a category where adding TODOs is particularly encouraged?
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
How to sign up: message theothertom on IRC.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on oohay.retro.
Indexing approach: Must submit pages for indexing
7138675518c3897ddd9ec4f58bd814ebc420d016
229
223
2025-06-24T22:37:38Z
Loganius
6
Add a websites section and add my game servers.
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service. To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN mail ===
cghmn-mail.retro. This is run by cursedsilicon.
Webmail: available - targets IE5 on Windows 3.1 as a minimum.
IMAP: ???
POP: ???
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|}
You must at least specify either the IP or the hostname, otherwise people won't be able to connect to your server.
This feels like a category where adding TODOs is particularly encouraged?
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|}
IP/Hostname = What should people type into their browser to reach your site.
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
How to sign up: message theothertom on IRC.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on oohay.retro.
Indexing approach: Must submit pages for indexing
43282be573075329ea78d554983d797abbe00b8b
231
229
2025-06-25T22:04:12Z
CursedSilicon
1
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: Both should connect as "insecure/plaintext" modes. I'm too lazy to set up SSL encryption yet'''
How to sign up: @cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on oohay.retro.
'''Indexing approach: Must submit pages for indexing'''
429d0fba4830fd3a2a87650c4339fefa4ba1cab8
237
231
2025-07-01T01:18:39Z
CursedSilicon
1
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: Both should connect as "insecure/plaintext" modes. I'm too lazy to set up SSL encryption yet'''
How to sign up: @cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on '''oohay.retro'''
'''Must submit pages for indexing'''
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
f51a5507993ee8dd522c15c09a85937ea305a16f
240
237
2025-07-13T01:33:46Z
CursedSilicon
1
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on '''oohay.retro'''
'''Must submit pages for indexing'''
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
8726c3555db85961625cb72c0721c21e1c365d80
241
240
2025-07-13T01:35:25Z
CursedSilicon
1
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on '''oohay.retro'''
'''Must submit pages for indexing'''
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''www.chivanet''''' (no TLD but WWW is required!)
Has both a web and CGHMN version
'''Message Serena to have your website indexed'''
22ecb1b09c9938d14e732eaa217b4ade96f95b58
242
241
2025-07-13T02:32:00Z
CursedSilicon
1
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on '''oohay.retro'''
'''Must submit pages for indexing'''
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''www.chivanet''''' (no TLD but WWW is required!)
Has both a web and CGHMN version
'''Sites can be added via the Pandia UI'''
5af826413dc11b0cf13c548187c30c081ccb8b93
243
242
2025-07-13T03:00:46Z
Snw
13
/* Pandia Search */ elucidate the web/CGHMN feature in Pandia
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Oohay ===
Available on '''oohay.retro'''
'''Must submit pages for indexing'''
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''www.chivanet''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
ef9d52e104fbafc04e945b58b43a1c8622eab98c
244
243
2025-07-13T03:57:19Z
Loganius
6
Add AskMe to and remove Oohay from the list of search engines.
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|Loganius
|askme.retro
|Windows Server 2003 R2
|IIS 6.0
|The AskMe Search Engine
|
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''www.chivanet''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
=== AskMe ===
Available on '''askme.retro'''
'''Must submit pages for indexing'''
d1d0b8da087aba98682b0306aae32f5b3ad8746d
245
244
2025-07-13T04:18:55Z
Loganius
6
Add Oohay to the list of websites
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
Available on irc.cghmn.retro (no TLS), and bridged onto the regular internet and Discord.
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|Loganius
|askme.retro
|Windows Server 2003 R2
|IIS 6.0
|The AskMe Search Engine
|
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|-
|ch0ccyra1n
|oohay.retro
|Ubuntu Server
|Nginx
|A collection of services for Compu-Global-Hyper-Mega-Net
|
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''www.chivanet''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
=== AskMe ===
Available on '''askme.retro'''
'''Must submit pages for indexing'''
4e90b694dd2392585ab76337d2129755102fcc32
246
245
2025-07-13T04:30:51Z
Ch0ccyra1n
14
Create table for IRC servers
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
{| class="wikitable"
|+
!Hostname
!Port (non-TLS)
!TLS?
!Notes
|-
|irc.cghmn.retro
|6667
|no
|Bridged onto the regular internet and Discord
|-
|irc.loganius.retro
|6667
|yes, at 6697
|
|}
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|Loganius
|askme.retro
|Windows Server 2003 R2
|IIS 6.0
|The AskMe Search Engine
|
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|-
|ch0ccyra1n
|oohay.retro
|Ubuntu Server
|Nginx
|A collection of services for Compu-Global-Hyper-Mega-Net
|
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''www.chivanet''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
=== AskMe ===
Available on '''askme.retro'''
'''Must submit pages for indexing'''
9063efb603c8bb89649131958bc154162d501bda
247
246
2025-07-13T04:32:32Z
Ch0ccyra1n
14
Add page to Compu-Global-Hyper-Mega-Net category
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
{| class="wikitable"
|+
!Hostname
!Port (non-TLS)
!TLS?
!Notes
|-
|irc.cghmn.retro
|6667
|no
|Bridged onto the regular internet and Discord
|-
|irc.loganius.retro
|6667
|yes, at 6697
|
|}
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|Loganius
|askme.retro
|Windows Server 2003 R2
|IIS 6.0
|The AskMe Search Engine
|
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|-
|ch0ccyra1n
|oohay.retro
|Ubuntu Server
|Nginx
|A collection of services for Compu-Global-Hyper-Mega-Net
|
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''www.chivanet''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
=== AskMe ===
Available on '''askme.retro'''
'''Must submit pages for indexing'''
[[Category:Compu-Global-Hyper-Mega-Net]]
71f4d1da8a277aed92e5795965dc4bb8e160919e
255
247
2025-07-15T18:18:04Z
Snw
13
/* Game servers */
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
{| class="wikitable"
|+
!Hostname
!Port (non-TLS)
!TLS?
!Notes
|-
|irc.cghmn.retro
|6667
|no
|Bridged onto the regular internet and Discord
|-
|irc.loganius.retro
|6667
|yes, at 6697
|
|}
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.1
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|-
|Serena
|wow.chivanet
|100.96.13.13
|World of Warcraft 3.3.5a (Wrath of the Lich King)
|Linux
|Message Serena for an account
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|Loganius
|askme.retro
|Windows Server 2003 R2
|IIS 6.0
|The AskMe Search Engine
|
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|-
|ch0ccyra1n
|oohay.retro
|Ubuntu Server
|Nginx
|A collection of services for Compu-Global-Hyper-Mega-Net
|
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''www.chivanet''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
=== AskMe ===
Available on '''askme.retro'''
'''Must submit pages for indexing'''
[[Category:Compu-Global-Hyper-Mega-Net]]
f2638b09ba5a11fe32fc56569f05f5626e67083c
256
255
2025-07-22T05:41:30Z
Loganius
6
Update the info for the services I'm running
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
{| class="wikitable"
|+
!Hostname
!Port (non-TLS)
!TLS?
!Notes
|-
|irc.cghmn.retro
|6667
|no
|Bridged onto the regular internet and Discord
|-
|irc.loganius.retro
|6667
|yes, at 6697
|Must register your nick with NickServ before you can start talking. You'll need working email for this.
|}
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.6
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|-
|Serena
|wow.chivanet
|100.96.13.13
|World of Warcraft 3.3.5a (Wrath of the Lich King)
|Linux
|Message Serena for an account
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|Loganius
|askme.retro
|Windows Server 2003 R2
|IIS 6.0
|The AskMe Search Engine
|
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|-
|ch0ccyra1n
|oohay.retro
|Ubuntu Server
|Nginx
|A collection of services for Compu-Global-Hyper-Mega-Net
|
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''www.chivanet''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
=== AskMe ===
Available on '''askme.retro'''
'''Must submit pages for indexing'''
[[Category:Compu-Global-Hyper-Mega-Net]]
f415fa4f505ca61c17abf89d18ec2a96c632b700
User:Hadn69
2
92
248
2025-07-13T05:05:32Z
Hadn69
15
Created page with "This is a test of the page creation system. If you have received this message, please ignore it."
wikitext
text/x-wiki
This is a test of the page creation system. If you have received this message, please ignore it.
30da9815a403543541a0a512815de9b92449bcc2
Netra T1
0
44
250
71
2025-07-15T10:55:21Z
CursedSilicon
1
wikitext
text/x-wiki
Along with its much larger brother the [[SunFire Enterprise 420R|Sunfire 420R]] the Netra T1 100 is one of the several pieces of Sun equipment in my collection
At this time I don't have much information to post about it. I have not powered any of the Sun equipment on to investigate it deeper
Also the face plate fell off. Though apparently that's common with the brittle plastic
[[File:Netra T1 (front).jpg|none|thumb|Netra T1 (front)]]
[[File:Netra T1 (Rear).jpg|alt=Netra T1 (Rear)|none|thumb|Netra T1 (Rear)]]
abd33f6a4d3d3b8ef9e865b15f14c4192b9ff5f9
Mac Mini G4
0
80
251
143
2025-07-15T10:58:26Z
CursedSilicon
1
wikitext
text/x-wiki
My iMac G3/350 "BlueBerry" died during the March 2025 Interim Computer Festival
So I bought a G4 1.5Ghz Mac Mini from [https://os9.shop some dude in Virginia] who sells refurbed ones running OS 9.2.2 of all things?
It's a maxed out Mac Mini G4 @ 1.5Ghz with 1GB of RAM and a 120GB mSATA SSD on an IDE adapter card
'''After disassembling it to remove its (cheap as hell) SSD the power button detached from the main system board. It needs to be replaced before the unit can reenter service'''
70b6a0bd1c8a60c0754d95e500bc9d8eb44e1c5e
Old Computers
0
2
252
142
2025-07-15T10:59:16Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference.
<big>'''NOTE: This list is non-exhaustive as I'm constantly picking up new weird old tech'''</big>
=== Acer Inc ===
[[Acer EasyStore H340]]
=== Apple Computers Inc ===
[[Powermac G4]] "Mirror Drive Door" (MDD)
[[Powermac G5]] Quad
[[Mac Mini G4]]
[[Xserve G4]]
[[Xserve G5]]
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ|Cobalt RaQ4]]
=== Dell Computers ===
[[PowerEdge 2500]]
[[OptiPlex GX1]]
[[Dell XPS Pro200N|XPS Pro200N]]
[[Dimension XPS D266]]
=== Digital Equipment Corporation ===
[[DEC AlphaServer 2100|DEC AlphaServer 2100 4/275]]
=== Hewlett Packard ===
[[HP MediaSmart EX495]]
[[HP KAYAK XA 6/400 MT]]
=== Silicon Graphics ===
[[SGI Octane]]
[[SGI Visual Workstation 320]]
=== Sun Microsystems ===
[[Netra X1]]
[[Netra T1]]
[[SunFire Enterprise 420R]]
[[Ultra 10 Workstation]]
=== Whitebox/custom builds ===
[[Windows 98 PC|World's Fastest Windows 98 PC]]
[[Disc Ripper|Disc Ripper aka "Napster"]]
=== Miscellaneous (Anything not 'retro') ===
[[Framework 13]]
[[Main Desktop]]
[[Home Server]]
[[Hyve Zeus]]
[[Hyve Cygnus]]
[[Video Capture PC]]
2f2e1ab2c2797b97a90d7d7a57109fb62223172b
253
252
2025-07-15T11:00:08Z
CursedSilicon
1
wikitext
text/x-wiki
As the title suggests, and indeed why you're here. '''''I have a lot of old computers'''''
This page serves as an index catalog of them for easy reference.
<big>'''NOTE: This list is non-exhaustive as I'm constantly picking up new weird old tech'''</big>
=== Acer Inc ===
[[Acer EasyStore H340]]
=== Apple Computers Inc ===
[[Powermac G4]] "Mirror Drive Door" (MDD)
[[Powermac G5]] Quad
[[Mac Mini G4]]
[[Xserve G4]]
[[Xserve G5]]
=== Cobalt Networks ===
[[Cobalt Qube]]
[[Cobalt RaQ|Cobalt RaQ4]]
=== Dell Computers ===
[[PowerEdge 2500]]
[[Dell XPS Pro200N|XPS Pro200N]]
[[Dimension XPS D266]]
=== Digital Equipment Corporation ===
[[DEC AlphaServer 2100|DEC AlphaServer 2100 4/275]]
=== Hewlett Packard ===
[[HP MediaSmart EX495]]
=== Silicon Graphics ===
[[SGI Octane]]
[[SGI Visual Workstation 320]]
=== Sun Microsystems ===
[[Netra X1]]
[[Netra T1]]
[[SunFire Enterprise 420R]]
[[Ultra 10 Workstation]]
=== Whitebox/custom builds ===
[[Windows 98 PC|World's Fastest Windows 98 PC]]
[[Disc Ripper|Disc Ripper aka "Napster"]]
=== Miscellaneous (Anything not 'retro') ===
[[Framework 13]]
[[Main Desktop]]
[[Home Server]]
[[Hyve Zeus]]
[[Hyve Cygnus]]
[[Video Capture PC]]
9ecf1a95cc80464cc33be7641670e856848d1ee4
Cobalt Qube 2
0
4
254
8
2025-07-15T11:00:52Z
CursedSilicon
1
wikitext
text/x-wiki
The Cobalt Qube was the worlds first "Linux Appliance" designed and released by Cobalt Networks (later purchased by Sun Microsystems). Sold from 1998 to 2002 it features a modified Red Hat Linux operating system and a proprietary Web GUI for server management.
The original Qube systems were equipped with MIPS RM5230 (150Mhz, Original Qube) or RM5231 (250Mhz, Qube 2) processors. These CPU's are similar to the RM5000 series in SGI's "Indy" workstations.
Both the Qube 1 and 2 come with 16MB of RAM (2x8MB SIMM's) and an 8GB or 10GB 3.5 inch IDE hard disk as standard.
Gateway also produced re-badged Cobalt Qube 2's which came in black and included a PCI Dial-Up modem. '''I do not have one of these so I cannot document its functionality or specifications'''
The original power supply can (and should) be replaced with a 45W USB-C power adapter. Bridging it requires a USB-C to 12V barrel connector and a Barrel to 3-pin DIN (Male) 5.5x 2.1mm cable
There is also a 40mm internal fan that should be replaced. Installing heatsinks on all internal chips is also recommended to prolong the lifespan of the device.
My Cobalt Qube 2 has been significantly modified since I purchased it from a user on eBay in late 2023. Some of the present modifications include
* RAM is maxed out to 256MB
* The original IDE hard disk has been replaced with 120GB SATA SSD using Startech SATA to IDE adapter. Due to the slow disk controller on the Cobalt Qube 2 (4MB/s at best) an SD card may be a more economical replacement
* The "BIOS" (or system bootstrap ROM) has been replaced with the "CoLo" bootloader. The original Cobalt firmware was hard-coded to launch a Linux kernel from an '''ext2 ''(not ext3 or ext4!)''''' partition on /dev/hda1
CoLo additionally allows connection to the unit via the RS232 serial port for system control after power on. The standard 115200,8,1 configuration will allow connection to the unit. Kernels can be downloaded and executed via TFTP via the CoLo interface
'''At this time the unit is functional, but not presently in operation'''
210703817152a203528dc0b626815882596f0de4
Dell XPS Pro200N
0
64
257
108
2025-08-05T00:59:57Z
CursedSilicon
1
wikitext
text/x-wiki
Recent pickup from a University of Washington (UW) auction.
This unit is currently equipped with
- A Pentium Pro 200Mhz(!)
- 128MB of EDO memory (max may be higher? Dell only shipped up to 128MB in this unit)
- Two 120GB SSD's. One on each IDE channel (using Startech SATA to IDE adapters)
- Matrox Millennium II 8MB video card
- 3Com 3C950C-TX 10/100 network card
Currently it is installed with Windows 3.11 and "Stampede Linux" 0.90. Stampede is a Pentium processor optimized Linux distribution that derives from Slackware 7
Due to the distribution being end-of-lifed roughly 25 years ago it's likely to be replaced with a "Pentium Optimized Linux from Scratch" at a later date, pending purchase of a video card that contains an accelerated X server (the Matrox Millennium requires the "MGA" kernel driver and did not exist in 2.0/2.2 kernels according to research)
Images of this device also show several (unknown) expansion cards from what ever it was being used for originally. These have been removed after photographing
[[File:PXL 20250214 033500161.jpg|thumb|alt=XPS Pro 200N (front)|XPS Pro 200N (front)]]
[[File:PXL 20250214 033516741.jpg|thumb|alt=XPS Pro 200N (rear)|PS Pro 200N (rear)]]
6e28f65d160130c27dbadb399cddfe5c524e0799
CGHMN-IP-Allocations
0
77
259
249
2025-08-16T03:11:24Z
Loganius
6
Update IP allocations list
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|hugh.loganius.retro
|100.96.9.100
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|hugh.loganius.retro
|100.96.9.100
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
49ddec477bb762d8e05d47b294d22b57fafe1a5d
260
259
2025-08-16T03:13:17Z
Loganius
6
Update DNS server for loganius.retro
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|hugh.loganius.retro
|100.96.9.100
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|''Cursed''
|''-''
|''-''
|''172.23.0.69''
|''Future CGHMN Mail Server''
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
80e81b71b80739b3cbb1256d938b5b4f1004795f
261
260
2025-08-21T20:53:56Z
Loganius
6
Add my new Win2k ILS server
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|hugh.loganius.retro
|100.96.9.100
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
fadabb10e16dcfe6a1c6f7a26cc15c9a933f07a7
262
261
2025-08-22T21:29:51Z
Loganius
6
AskMe.retro also uses Kirk
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
740bafdb0b18316195d4fa5ede72dafe9e3e9e1c
263
262
2025-08-30T15:05:21Z
Loganius
6
Add the new members to the list of IP allocations
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|Servers at /dev/hack
| -
|172.23.3/22
|172.23.0.1
|May add more servers/services physically located at /dev/hack so might as well give them an IP range
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
923736b51e5aeeaf8f5d0b0112e1983170301b7f
264
263
2025-08-30T15:46:15Z
Loganius
6
/dev/hack is dead to us
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
2ce361fcca9b04eb0e57d04505143cf8524ef1f7
265
264
2025-09-01T05:24:04Z
Loganius
6
I got approval to use 100.96.0.0/24 for single IP allocations. Writing this down so we don't forget.
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members which need routed subnets receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default. Members who only need single IPs receive an IP from the <code>100.96.0.0/24</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
d7aaf7040617cf23fa3c3e06d37da91379286d39
266
265
2025-09-01T05:52:21Z
Loganius
6
Phrasing
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members which need routed subnets receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default. Members who only a single IP receive an IP from the <code>100.96.0.0/24</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
46f6ef532446e5f5f1016e2238499751d1c97918
267
266
2025-09-01T17:43:31Z
Loganius
6
Add GothPanda's new single IP allocation
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members which need routed subnets receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default. Members who only a single IP receive an IP from the <code>100.96.0.0/24</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|-
|GothPanda
|Unknwon
|100.96.0.1
|N/A
|Proxy
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
128c9f26ededad9bca5afc7620a9852ad5d663a5
270
267
2025-09-04T00:21:16Z
Loganius
6
Add my new IP allocation
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members which need routed subnets receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default. Members who only a single IP receive an IP from the <code>100.96.0.0/24</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|-
|GothPanda
|Unknwon
|100.96.0.1
|N/A
|Proxy
|-
|loganius
|Lenovo Yoga 6 that's falling apart.
|100.96.0.2
|N/A
|Travel
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
661149fb772b8052b8cf82b57be3cf661fd5da09
271
270
2025-09-04T00:21:39Z
Loganius
6
Consistent capitalization
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members which need routed subnets receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default. Members who only a single IP receive an IP from the <code>100.96.0.0/24</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|-
|GothPanda
|Unknwon
|100.96.0.1
|N/A
|Proxy
|-
|Loganius
|Lenovo Yoga 6 that's falling apart.
|100.96.0.2
|N/A
|Travel
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
9a9dfa06dc1ddb1ac45bedbecc497dfc2017a85a
272
271
2025-09-07T19:32:51Z
Loganius
6
Typo
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members which need routed subnets receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default. Members who only a single IP receive an IP from the <code>100.96.0.0/24</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|-
|GothPanda
|Unknown
|100.96.0.1
|N/A
|Proxy
|-
|Loganius
|Lenovo Yoga 6 that's falling apart.
|100.96.0.2
|N/A
|Travel
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
d625adf29bfc6452e26d800d5f497cbe8ab31268
273
272
2025-09-14T00:24:35Z
Loganius
6
Added i430vx and rwf93
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members which need routed subnets receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default. Members who only a single IP receive an IP from the <code>100.96.0.0/24</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|-
|GothPanda
|Unknown
|100.96.0.1
|N/A
|Proxy
|-
|Loganius
|Lenovo Yoga 6 that's falling apart.
|100.96.0.2
|N/A
|Travel
|-
|i430vx
|Unknown
|100.89.128.35
|100.96.35.0/24
| -
|-
|rwf93
|Unknown
|100.89.128.36
|100.96.36.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
767a70a62dd76d29dd3c5f5e12c04c70dc0502e2
274
273
2025-09-21T23:58:50Z
Loganius
6
Added accipitroid's allocation
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members which need routed subnets receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default. Members who only a single IP receive an IP from the <code>100.96.0.0/24</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|-
|GothPanda
|Unknown
|100.96.0.1
|N/A
|Proxy
|-
|Loganius
|Lenovo Yoga 6 that's falling apart.
|100.96.0.2
|N/A
|Travel
|-
|i430vx
|Unknown
|100.89.128.35
|100.96.35.0/24
| -
|-
|rwf93
|Unknown
|100.89.128.36
|100.96.36.0/24
| -
|-
|accipitroid
|Unknown
|100.89.128.37
|100.96.37.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
d8be05e7b5ea602b9bbe4a2cd15383e859ce5785
287
274
2025-10-18T16:00:19Z
Loganius
6
omitted a word
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members which need routed subnets receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default. Members who only need a single IP receive an IP from the <code>100.96.0.0/24</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|-
|GothPanda
|Unknown
|100.96.0.1
|N/A
|Proxy
|-
|Loganius
|Lenovo Yoga 6 that's falling apart.
|100.96.0.2
|N/A
|Travel
|-
|i430vx
|Unknown
|100.89.128.35
|100.96.35.0/24
| -
|-
|rwf93
|Unknown
|100.89.128.36
|100.96.36.0/24
| -
|-
|accipitroid
|Unknown
|100.89.128.37
|100.96.37.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
b38b855692159a5463b4dadd90cf29bbb4c4fc15
288
287
2025-10-18T16:46:04Z
Loganius
6
Added Elim
wikitext
text/x-wiki
=== IP Address Allocations in the CGHMN Network ===
This page documents any IP addresses that are allocated statically to routers, subnets and members.
=== Networks on the CGHMN side ===
This is a list of all networks active on the CGHMN server side.
{| class="wikitable"
|+
!Network Name
!VLAN
!Subnet
!Router IP
!Notes
|-
|Core Services
|4
|172.23.4.0/22
|172.23.4.1
| -
|-
|Servers
|8
|172.23.8.0/22
|172.23.8.1
| -
|-
|Global LAN
|256
| -
| -
|No IP traffic, no assigned IP addresses
|-
|Wireguard Members Tunnel
| -
|100.89.128.0/22
|100.89.128.0
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host
|-
|VMs on the OVH Box
| -
|172.23.3/22
|172.23.0.1
|Servers running on KS-1 box at OVH Canada
|}
=== Members' Networks ===
This list contains the subnets that are assigned to member routers on the network. Members which need routed subnets receive one <code>/24</code> network from the <code>100.96.0.0/13</code> block, in first-come-first-serve sequential order per default. Members who only need a single IP receive an IP from the <code>100.96.0.0/24</code> block, in first-come-first-serve sequential order per default.
{| class="wikitable"
|+
!Member Name
!Peer Endpoint/Via
!Tunnel IP
!Routed Subnet(s)
!Notes
|-
|CursedSilicon
|/dev/hack (usually)
|100.89.128.1
|100.96.1.0/24
| -
|-
|Talija
| DIY
|100.89.128.2
|100.96.2.0/24
| -
|-
|Snep
|OPNsense box and PPPoE server
|100.89.128.3
|100.96.3.0/24
| -
|-
|Snep
|PC VPN tunnel
|100.89.128.4
| -
| -
|-
|Hadn69
| DIY
|100.89.128.5
|100.96.5.0/24
| -
|-
|Lily
| Dell PowerEdge R620
|100.89.128.6
|100.96.6.0/24
| -
|-
|Theothertom
| Unknown
|100.89.128.7
|100.96.7.0/24
| -
|-
|Lily
| Raspberry Pi
|100.89.128.8
|100.96.8.0/24
| -
|-
|Loganius
| PPTP Bridge on Debian VM
|100.89.128.9
|100.96.9.0/24
| Using Microsoft Virtual Server 2005 under Windows Server 2003.
|-
|GothPanda
| OpenWRT
|100.89.128.10
|100.96.10.0/24
| TP-Link Archer C59 v2
|-
|ch0ccyra1n
| Unknown
|100.89.128.11
|100.96.11.0/24
| -
|-
|Chromaryu
|Unknown
|100.89.128.12
|100.96.12.0/24
| -
|-
|Serena
|Unknown
|100.89.128.13
|100.96.13.0/24
|Chivanet
|-
|CursedSilicon
|OpenWRT VM
|100.89.128.14
|100.96.14.0/24
|At home
|-
|Mel
|OpenWRT VM
|100.89.128.15
|100.96.15.0/24
|"Glinet Nugget"
|-
|Spz2024
|OpenWRT VM
|100.89.128.16
|100.96.16.0/24
| OpenWRT in QEMU on Windows host
|-
|Spaztron64
|Unknown
|100.89.128.17
|100.96.17.0/24
| -
|-
|Harry
|Unknown
|100.89.128.18
|100.96.18.0/24
| -
|-
|Mel
|OpenWRT VM
|100.89.128.19
|100.96.19.0/24
|OpenWRT VM
|-
|Spaztron64
|Unknown
|100.89.128.20
|100.96.20.0/24
| -
|-
|TsuboDii
|Unknown
|100.89.128.21
|100.96.21.0/24
| -
|-
|j4yc33
|Unknown
|100.89.128.22
|100.96.22.0/24
| -
|-
|CursedSilicon
|Unknown
|100.89.128.23
|100.96.23.0/24
|"Travel Router"
|-
|Dusty
|Unknown
|100.89.128.24
|100.96.24.0/24
| -
|-
|Nicuuut
|Unknown
|100.89.128.25
|100.96.25.0/24
| -
|-
|Tyler McVicker
|Unknown
|100.89.128.26
|100.96.26.0/24
|"Game Servers"
|-
|YoungChief
|Unknown
|100.89.128.27
|100.96.27.0/24
| -
|-
|Zefie
|Unknown
|100.89.128.28
|100.96.28.0/24
| -
|-
|CH
|Unknown
|100.89.128.29
|100.96.29.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.30
|100.96.30.0/24
| -
|-
|Alyx
|Unknown
|100.89.128.31
|100.96.31.0/24
|"Datacenter"
|-
|Grawity
|Unknown
|100.89.128.32
|100.96.32.0/24
| -
|-
|pmc
|Unknown
|100.89.128.33
|100.96.33.0/24
| -
|-
|kirb
|Unknown
|100.89.128.34
|100.96.34.0/24
| -
|-
|GothPanda
|Unknown
|100.96.0.1
|N/A
|Proxy
|-
|Loganius
|Lenovo Yoga 6 that's falling apart.
|100.96.0.2
|N/A
|Travel
|-
|i430vx
|Unknown
|100.89.128.35
|100.96.35.0/24
| -
|-
|rwf93
|Unknown
|100.89.128.36
|100.96.36.0/24
| -
|-
|accipitroid
|Unknown
|100.89.128.37
|100.96.37.0/24
| -
|}
=== Member-Delegated (Sub-) Domains ===
{| class="wikitable"
|+
!Member Name
!Domain
!Nameserver
!Nameserver IP
!Notes
|-
|Serena
|chivanet
|pandora.chivanet
|100.96.13.7
| -
|-
|Nicuuut
|goat
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Talija
|coyote.retro
|a.ns.coyote.retro
|100.96.2.53
| -
|-
|''Snep''
|''snep.retro''
|''ns1.snep.retro''
|''172.23.8.11''
| Currently offline
|-
|Lily
|lily.retro
|ns1.lily.retro
|100.96.6.250
| -
|-
|Loganius
|loganius.retro
|kirk.loganius.retro
|100.96.9.3
| -
|-
|theothertom
|theothertom.retro
|north-foreland.theothertom.retro
|100.96.7.12
| -
|-
|Spaztron64
|arcesia.retro
|ns.arcesia.retro
|100.96.17.105
| -
|-
|ch0ccyra1n
|oohay.retro
|ns1.oohay.retro
|100.96.11.197
| -
|-
|Harry
|404.retro
|ns.404.retro
|100.96.18.254
| -
|-
|GothPanda
|northstar.retro
|ns1.northstar.retro
|172.23.3.201
| -
|-
|Loganius
|askme.retro
|kirk.loganius.retro
|100.96.9.3
| -
|}
=== Member Servers hosted on the CGHMN side ===
{| class="wikitable"
|+
!Member Name
!VM/CT ID
!Server Name
!Server IP
!Notes
|-
|Snep
|10811
|srv01.snep.retro
|172.23.8.11
| -
|-
|Talija
|118
|junko.coyote.retro
|172.23.3.173
|Network diagnostics
|-
|Loganius
|123
|kira.loganius.retro
|172.23.0.52
|WMS Server
|-
|Cursed
|107
|cghmn-mail.retro
|172.23.0.69
|Mail Server
|-
|Nicuuut
|124
|sanemi.nicuuut.goat
|172.23.0.53
| -
|-
|Nicuuut
|103
|mitsuri.nicuuut.goat
|172.23.0.54
| -
|-
|GothPanda
|104
|litwick.northstar.retro
|172.23.3.201
|also hosts tests.cghmn
|-
|Loganius
|109
|worf.loganius.retro
|172.23.0.55
|ILS Server (for MS NetMeeting)
|-
|Loganius
|10056
|elim.loganius.retro
|172.23.0.56
|Minecraft Reverse Proxy Server
|}
[[Category:Compu-Global-Hyper-Mega-Net]]
f2ad4049bb0b6e0c9920cba1862e5c6f28af279b
Services people are running
0
91
268
256
2025-09-03T15:35:04Z
Ch0ccyra1n
14
Update status of oohay.retro to be accurate
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
{| class="wikitable"
|+
!Hostname
!Port (non-TLS)
!TLS?
!Notes
|-
|irc.cghmn.retro
|6667
|no
|Bridged onto the regular internet and Discord
|-
|irc.loganius.retro
|6667
|yes, at 6697
|Must register your nick with NickServ before you can start talking. You'll need working email for this.
|}
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.6
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|-
|Serena
|wow.chivanet
|100.96.13.13
|World of Warcraft 3.3.5a (Wrath of the Lich King)
|Linux
|Message Serena for an account
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or http://live.loganius.retro:81/</nowiki>
|-
|Loganius
|askme.retro
|Windows Server 2003 R2
|IIS 6.0
|The AskMe Search Engine
|
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|-
|ch0ccyra1n
|oohay.retro
|Ubuntu Server
|Nginx
|A CGHMN Service Provider
|Currently down, will be up eventually.
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at forum.theothertom.retro. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Google Search Appliance ===
Available on '''google.retro'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''www.chivanet''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
=== AskMe ===
Available on '''askme.retro'''
'''Must submit pages for indexing'''
[[Category:Compu-Global-Hyper-Mega-Net]]
db578859e05772e9c304a7f6cac1662e8199d0b4
269
268
2025-09-03T15:37:42Z
Ch0ccyra1n
14
Add links for different services
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network.
=== IRC ===
{| class="wikitable"
|+
!Hostname
!Port (non-TLS)
!TLS?
!Notes
|-
|irc.cghmn.retro
|6667
|no
|Bridged onto the regular internet and Discord
|-
|irc.loganius.retro
|6667
|yes, at 6697
|Must register your nick with NickServ before you can start talking. You'll need working email for this.
|}
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.6
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|-
|Serena
|wow.chivanet
|100.96.13.13
|World of Warcraft 3.3.5a (Wrath of the Lich King)
|Linux
|Message Serena for an account
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or </nowiki>http://live.loganius.retro:81/
|-
|Loganius
|askme.retro
|Windows Server 2003 R2
|IIS 6.0
|The AskMe Search Engine
|
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|-
|ch0ccyra1n
|oohay.retro
|Ubuntu Server
|Nginx
|A CGHMN Service Provider
|Currently down, will be up eventually.
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN Proxmox Hosting ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at [http://forum.theothertom.retro forum.theothertom.retro]. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Google Search Appliance ===
Available on '''[http://google.retro google.retro]'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''[http://www.chivanet www.chivanet]''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
=== AskMe ===
Available on '''[http://askme.retro askme.retro]'''
'''Must submit pages for indexing'''
[[Category:Compu-Global-Hyper-Mega-Net]]
6f0559d61af0153474faf1eba9fc2cdc2fc2d77f
277
269
2025-10-01T18:21:17Z
Ch0ccyra1n
14
/* AIM */
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network with a [[AIM Clients|client]].
=== IRC ===
{| class="wikitable"
|+
!Hostname
!Port (non-TLS)
!TLS?
!Notes
|-
|irc.cghmn.retro
|6667
|no
|Bridged onto the regular internet and Discord
|-
|irc.loganius.retro
|6667
|yes, at 6697
|Must register your nick with NickServ before you can start talking. You'll need working email for this.
|}
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.6
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|-
|Serena
|wow.chivanet
|100.96.13.13
|World of Warcraft 3.3.5a (Wrath of the Lich King)
|Linux
|Message Serena for an account
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or </nowiki>http://live.loganius.retro:81/
|-
|Loganius
|askme.retro
|Windows Server 2003 R2
|IIS 6.0
|The AskMe Search Engine
|
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|-
|ch0ccyra1n
|oohay.retro
|Ubuntu Server
|Nginx
|A CGHMN Service Provider
|Currently down, will be up eventually.
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN Proxmox Hosting ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at [http://forum.theothertom.retro '''forum.theothertom.retro''']. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== TODO: A pastebin ===
Would be good for sharing logs etc.
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Google Search Appliance ===
Available on '''[http://google.retro google.retro]'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''[http://www.chivanet www.chivanet]''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
=== AskMe ===
Available on '''[http://askme.retro askme.retro]'''
'''Must submit pages for indexing'''
[[Category:Compu-Global-Hyper-Mega-Net]]
c8bf30712846fc2eb5149f4434b7646947a0315d
279
277
2025-10-05T19:43:38Z
CursedSilicon
1
We have a Pastebin!
wikitext
text/x-wiki
This is a collection of "services" available on CGHMN. It's intended as a bootstrapping point until we get something to help with discovery. Feel free to add your own services!
== Chat ==
=== AIM ===
CGHMN connects to Chivanet's AIM service (running RetroAimServer). To use it, you need to sign up via http://chivanet.org/aim/. Once you have a screenname, you can connect from within the network with a [[AIM Clients|client]].
=== IRC ===
{| class="wikitable"
|+
!Hostname
!Port (non-TLS)
!TLS?
!Notes
|-
|irc.cghmn.retro
|6667
|no
|Bridged onto the regular internet and Discord
|-
|irc.loganius.retro
|6667
|yes, at 6697
|Must register your nick with NickServ before you can start talking. You'll need working email for this.
|}
=== MSN Messenger ===
'''TODO (maybe ask to federate with NINA ala ChivaNet?) - CursedSilicon'''
== Email ==
You can run your own mail server on a .retro domain. If you would prefer not to (or want a backup), there are some open mail services (separate from general "hosting").
=== CGHMN Public Email Service (ala Hotmail/Yahoo/Gmail) ===
Webmail: available - Supports Internet Explorer 3 (in theory) as a minimum. IE5 on Win3.11 tested and verified working.
HTTP: http://cghmn-mail.retro
IMAP:: cghmn-mail.retro
POP3: cghmn-mail.retro
(both incoming and outgoing servers use the same address for POP/IMAP/SMTP)
'''NOTE: SSL is ''enabled'' but is not widely tested. Your mileage may vary. If you experience issues, just use insecure/plaintext modes for simplicity'''
How to sign up: message cursedsilicon on IRC/Discord.
== Game servers ==
{| class="wikitable"
|+
!User
!Hostname
!IP
!Game(s)
!OS
!Notes
|-
|Loganius
|loganius.retro
|100.96.9.6
|ClassiCube & Halo PC
|Windows Server 2003 R2
|Must connect by IP for Halo.
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Battle.Net
|Linux
|Just works! Plays Blizzard games up to Warcraft 3: Frozen Throne
|-
|CursedSilicon
|cursedsilicon.retro
|172.23.0.20
|Westwood Online
|Linux
|Just works! Plays Westwood games up to Red Alert 2: Yuri's Revenge
|-
|Serena
|wow.chivanet
|100.96.13.13
|World of Warcraft 3.3.5a (Wrath of the Lich King)
|Linux
|Message Serena for an account
|}
'''NOTE: Some services are "patched" at DNS level. Other games (such as Halo) require connecting to a server via IP. Check the notes!'''
== Websites ==
{| class="wikitable"
|+
!User
!IP/Hostname
!OS
!Server
!Brief Description
!Notes
|-
|Loganius
|loganius.retro
|Windows Server 2003 R2
|IIS 6.0
|Whatever I feel like putting there.
|Supports HTTPS.
|-
|Loganius
|live.loganius.retro
|Windows Server 2003 R2 x64
|IIS 6.0
|My livestream VODs.
|<nowiki>Livestreams at [rtsp | mms]://live.loganius.retro/, or </nowiki>http://live.loganius.retro:81/
|-
|Loganius
|askme.retro
|Windows Server 2003 R2
|IIS 6.0
|The AskMe Search Engine
|
|-
|CursedSilicon
|cursedsilicon.retro
|Linux
|Nginx
|Basically a landing page for new users.
Also has an FTP with lots of useful files
|Also available at http://cghmn.cursedsilicon.net
|-
|ch0ccyra1n
|oohay.retro
|Ubuntu Server
|Nginx
|A CGHMN Service Provider
|Currently down, will be up eventually.
|}
== Hosting ==
=== Theotherhost ===
{| class="wikitable"
|+
!OS
!Platform
!Admin UI requirements
!Languages
!Databases
!Services
|-
|Linux
|BlueOnyx
|IE 5 (tested on Win 2k)
|Perl 5.8.8, PHP 5.1.5
|MySQL 5.0.95
|FTP/Web/SMTP/IMAP/POP/DNS/Mailing lists
|}
'''How to sign up: message theothertom on IRC.'''
=== CGHMN Proxmox Hosting ===
CGHMN will offer Proxmox based hosting in future. Currently we are limited by hard disk capacity, but small servers can be uploaded and run. Ask CursedSilicon for details.
== Other communications ==
=== theotherforum ===
There is a forum at [http://forum.theothertom.retro '''forum.theothertom.retro''']. This can be used to share projects/sites, as well as for general discussion. Currently, you need an email address to sign up.
=== Pastebin ===
http://wastebin.retro thanks Alyx!
=== TODO: Image host ===
Somewhere for screenshots etc.
=== TODO: webring ===
To help find sites
== Search ==
=== Google Search Appliance ===
Available on '''[http://google.retro google.retro]'''
'''Submit domains for indexing to CursedSilicon. Crawling takes about 15 minutes'''
=== Pandia Search ===
Available on '''''[http://www.chivanet www.chivanet]''''' (no TLD but WWW is required!)
Has both a web and CGHMN version (automatically selected by detecting the domain from which the user visits)
'''Sites can be added via the Pandia UI'''
=== AskMe ===
Available on '''[http://askme.retro askme.retro]'''
'''Must submit pages for indexing'''
[[Category:Compu-Global-Hyper-Mega-Net]]
a124b45ea742df86e5d57f7d38f4c0b2c134dad0
.retro
0
93
275
2025-10-01T18:15:50Z
Ch0ccyra1n
14
Create page for .retro TLD
wikitext
text/x-wiki
'''.retro''' is a [[Compu-Global-Hyper-Mega-Net]] ([[Compu-Global-Hyper-Mega-Net|CGHMN]]) [[top-level domain]] ([[Top-level domain|TLD]]). Created in the first group of TLDs alongside [[.cghmn]], it serves as a generic TLD for sites on CGHMN and is administered by [[User:CursedSilicon|CursedSilicon]].
[[Category:Compu-Global-Hyper-Mega-Net]]
[[Category:Top-level domains]]
5da8b1bb173daa0d83d66de28c3bc1e8b75fea80
.cghmn
0
94
276
2025-10-01T18:17:46Z
Ch0ccyra1n
14
Create page for .cghmn TLD
wikitext
text/x-wiki
'''.cghmn''' is a [[Compu-Global-Hyper-Mega-Net]] ([[Compu-Global-Hyper-Mega-Net|CGHMN]]) [[top-level domain]] ([[Top-level domain|TLD]]). Created in the first group of TLDs alongside .retro, it serves as a TLD for sites on CGHMN and is administered by [[User:CursedSilicon|CursedSilicon]].
[[Category:Compu-Global-Hyper-Mega-Net]]
[[Category:Top-level domains]]
6be469f2769ea9d860fc6df827c1658282fc12ab
CGHMN 1.0
0
79
278
169
2025-10-01T18:29:58Z
Ch0ccyra1n
14
Add my own suggestion for onboarding improvements
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
== Tracking sheet for "what would we want in a general 1.0 release" ==
Let's break these down by user just to keep division of labor easy
=== CursedSilicon suggestions ===
The main blocker currently is access to reliable fiber at /dev/hack. Gaining that should give us ample bandwidth to start allowing broader user access to the network generally
Maybe invite a selection of "retro networking" youtube folks (TheSerialPort, ClabRetro, etc) to help tire kick things? Serena also suggested federation of retro network service providers, so this could be a useful step.
=== ch0ccyra1n suggestions ===
We should ensure that there is a better way to do onboarding. Some sort of web form on the clearnet for signups (or signup requests) would be good to have.
5cdd11c970bdc3a87a7fd5fb77bb4ebc5e08f95a
280
278
2025-10-06T19:31:47Z
Ch0ccyra1n
14
/* ch0ccyra1n suggestions */
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
== Tracking sheet for "what would we want in a general 1.0 release" ==
Let's break these down by user just to keep division of labor easy
=== CursedSilicon suggestions ===
The main blocker currently is access to reliable fiber at /dev/hack. Gaining that should give us ample bandwidth to start allowing broader user access to the network generally
Maybe invite a selection of "retro networking" youtube folks (TheSerialPort, ClabRetro, etc) to help tire kick things? Serena also suggested federation of retro network service providers, so this could be a useful step.
=== ch0ccyra1n suggestions ===
We should ensure that there is a better way to do onboarding. Some sort of web form on the clearnet for signups (or signup requests) would be good to have.<sup>[[https://signup.cghmn.org done]]</sup>
f264cc41ef9932bb4d7933db6073abe90ac98916
300
280
2025-10-28T23:53:24Z
CursedSilicon
1
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
== Tracking sheet for "what would we want in a general 1.0 release" ==
Let's break these down by user just to keep division of labor easy. This isn't a "we will do this" so much as a "request for comments"
=== CursedSilicon suggestions ===
We can trivially set up an OpenWRT build bot. But a custom splash screen that just asks for a users Wireguard+IP details would be fantastic for user onboarding. Need someone who can write Lua to do this though
=== ch0ccyra1n suggestions ===
<s>We should ensure that there is a better way to do onboarding. Some sort of web form on the clearnet for signups (or signup requests) would be good to have.<big>'''<sup>[</sup>'''</big></s><big>'''<sup>[https://signup.cghmn.org done]]</sup>'''</big>
7c36bd80850b95d25c8337b079e9a06ba4a61184
Signup
0
75
281
172
2025-10-06T21:44:01Z
CursedSilicon
1
Re-written for Open Beta
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
Compu-Global-Hyper-Mega-Net is now in '''''OPEN BETA!''''' That means if you're reading this, you've either filled out our signup page and gotten sent an email, or stumbled across this page on the Wiki.
Either way, welcome!
So. To get ON Compu-Global-Hyper-Mega-Net (hereby referred to as CGHMN for easier reference) you'll need a few things.
# A retro computer or device that can be terminated via ethernet. Using other networking standards like 802.11, Token Ring, AUI and others is totally fine, but you'll need to bridge them to ethernet!
# A device that can run the Wireguard and (optionally) Gretap protocols. Wireguard is a VPN stack that is used to encrypt traffic and connect your retro devices securely to the network over the internet. Gretap is used for tunneling "non TCP/IP" protocols, like IPX. Useful if you want to play DOOM or run other esoteric software, '''''but not required!'''''
# To have fun! Seriously. This project is meant to bring back the joy of the web as it existed in the 90's and 2000's. If you aren't having fun, we need to fix that
For Part 2 you can use any kind of device that runs '''''Linux/BSD''''' such as a Raspberry Pi or others. Virtual Machines are also absolutely supported!
For hardware, we recommend something like the [https://www.gl-inet.com/products/gl-ar300m/ GL.iNet Shadow]. This device retails for around $30~ US dollars on retailers such as Amazon and can push 40 megabits of bandwidth to CGHMN over Wireguard. This is more than sufficient for a significant number of retro machines. This device has been deployed by Cursed Silicon and other users and has been successfully tested at-scale hosting 15 simultaneous users at the Seattle Interim Computer Festival event.
Another option (if you have one) is the Raspberry Pi. Every Pi version through the original Pi 1 to the current Pi 5 [https://openwrt.org/toh/raspberry_pi_foundation/raspberry_pi are supported]. Adding a cheap USB LAN adapter makes this an attractive option if you have a spare Pi laying around.
The third option is to run a virtual machine as your CGHMN gateway. We support Proxmox, VMware, Virtualbox, Hyper-V and others. Using CGHMN does not necessarily require using vintage ''hardware'' and doing so can be impractical for a number of reasons. A lot of users (including Cursed Silicon and others) use virtualization to run [[Services people are running|services on the network]] efficiently
Finally if you're particularly proficient with Linux or Networking (or both) you can opt to run your own hardware configured to your specifications. We don't directly provide support for vendors like Microtik, Unifi or others, but during the closed testing we've done in past, users have been able to set these vendor devices up and successfully connect.
We recommend running the [https://openwrt.org/ OpenWRT] router distribution regardless of which option you choose. This supports an enormous array of hardware (including running as a VM) and even comes with a [https://cghmn.snep.zip/connect.sh ready-made script] written by our network architect, Snep. This script can be run on a device running OpenWRT to configure it directly for access to CGHMN.
The commands to run the script are as follows.
# Install OpenWRT and SSH into the device
# <code>wget <nowiki>https://cghmn.snep.zip/connect.sh</nowiki></code>
# <code>ash setup-cghmn.sh</code>
# Follow the prompts!
a8f6529474d750e04f7bc7751da19e898137b273
282
281
2025-10-07T20:21:53Z
CursedSilicon
1
Tweaked wordings, updated things to be more clear (hopefully)
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
Compu-Global-Hyper-Mega-Net is now in '''''OPEN BETA!''''' That means if you're reading this, you've either filled out our signup page and gotten sent an email, or stumbled across this page on the Wiki.
Either way, welcome!
So. To get ON Compu-Global-Hyper-Mega-Net (hereby referred to as CGHMN for easier reference) you'll need a few things.
# A retro computer/virtual machine or a device that can be ultimately terminated via ethernet. Using other networking standards like 802.11, Token Ring, AUI, BNC or others is totally fine, but you'll need to ultimately bridge them to Ethernet to talk to the device running Wireguard
# A device that can run the Wireguard and (optionally) Gretap protocols. Wireguard is a VPN stack that is used to encrypt traffic and connect your retro devices securely to the network over the internet. Gretap is used for tunneling "non TCP/IP" protocols, like IPX. Useful if you want to play DOOM or run other non-TCP/IP software, '''''but not required!'''''
# To '''have fun!''' Seriously. This project is meant to bring back the joy of the web as it existed in the 90's and 2000's. If you aren't having fun, we need to fix that.
For Step 2 you can use any kind of device that runs '''''Linux/BSD''''' such as a Raspberry Pi or others. Virtual Machines (such as Proxmox) are absolutely supported and encouraged!
For users looking to connect physical machines, you will need a hardware device. We recommend something like the [https://www.gl-inet.com/products/gl-ar300m/ GL.iNet Shadow]. This device retails for around $30~ US dollars on retailers such as Amazon and can push 40 megabits of bandwidth to CGHMN over Wireguard. This is more than sufficient for a significant number of retro machines. This device has been deployed by Cursed Silicon and other users and has been successfully tested at-scale hosting 15 simultaneous users at the Seattle Interim Computer Festival retro computing event.
Another option (if you have one) is the Raspberry Pi. Every Pi version through the original Pi 1 to the current Pi 5 [https://openwrt.org/toh/raspberry_pi_foundation/raspberry_pi is supported by OpenWRT]. Adding a cheap USB LAN adapter makes this an attractive option if you have a spare "old Ras Pi laying around"
The third option is to run a virtual machine as your CGHMN gateway. We provide support primarily for '''''Proxmox''''' but other virtualization stacks such as VMware, Virtualbox and Hyper-V will work, but may require manual configuration by the user. '''This option is best suited for users wanting to run servers (websites, old game servers etc) as running old OSes in Proxmox comes with a significant graphics performance penalty'''
We recommend running the [https://openwrt.org/ OpenWRT] router distribution regardless of which above option you choose. This supports an enormous array of hardware (including running as a VM) and even comes with a [https://cghmn.snep.zip/connect.sh ready-made script] written by our network architect, Snep. This script can be run on a device running OpenWRT to configure it directly for access to CGHMN.
Once installed in either a VM or on a physical device such as the GL.iNet Shadow, the device can be SSH'd into and the following commands can be run to begin configuration for CGHMN access.
# <code>wget <nowiki>https://cghmn.snep.zip/connect.sh</nowiki></code>
# <code>ash setup-cghmn.sh</code>
# Follow the prompts!
Finally if you're particularly proficient with Linux or Networking (or both) you can opt to run your own hardware configured to your specifications. We don't directly provide support for vendors like Microtik, Unifi or others, but during the closed testing we've done in past, users have been able to set these vendor devices up and successfully connect. [https://github.com/CGHMN/config-examples Example configurations are available here] however are untested except by the user who submitted them. Please reach out to the committer for assistance if the configuration scripts do not work.
Once again, to clarify: CGHMN '''''does''''' '''''not specifically require using "real" vintage hardware''''' as doing so can be impractical for a number of reasons. A lot of users (including Cursed Silicon and others) use virtualization, particularly to run [[Services people are running|services on the network]] efficiently or to quickly test out applications and features. '''Connecting a modern computer (EG a Windows 10 or 11 PC) to the network while not disallowed will encounter a lot of issues due to the age of the servers and services it is communicating with and is discouraged'''
975e1fdd249b04458abef9661685947e038d8475
283
282
2025-10-07T20:22:26Z
CursedSilicon
1
Fixing formatting
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
Compu-Global-Hyper-Mega-Net is now in '''''OPEN BETA!''''' That means if you're reading this, you've either filled out our signup page and gotten sent an email, or stumbled across this page on the Wiki.
Either way, welcome!
So. To get ON Compu-Global-Hyper-Mega-Net (hereby referred to as CGHMN for easier reference) you'll need a few things.
# A retro computer/virtual machine or a device that can be ultimately terminated via ethernet. Using other networking standards like 802.11, Token Ring, AUI, BNC or others is totally fine, but you'll need to ultimately bridge them to Ethernet to talk to the device running Wireguard
# A device that can run the Wireguard and (optionally) Gretap protocols. Wireguard is a VPN stack that is used to encrypt traffic and connect your retro devices securely to the network over the internet. Gretap is used for tunneling "non TCP/IP" protocols, like IPX. Useful if you want to play DOOM or run other non-TCP/IP software, '''''but not required!'''''
# To '''have fun!''' Seriously. This project is meant to bring back the joy of the web as it existed in the 90's and 2000's. If you aren't having fun, we need to fix that.
For Step 2 you can use any kind of device that runs '''''Linux/BSD''''' such as a Raspberry Pi or others. Virtual Machines (such as Proxmox) are absolutely supported and encouraged!
For users looking to connect physical machines, you will need a hardware device. We recommend something like the [https://www.gl-inet.com/products/gl-ar300m/ GL.iNet Shadow]. This device retails for around $30~ US dollars on retailers such as Amazon and can push 40 megabits of bandwidth to CGHMN over Wireguard. This is more than sufficient for a significant number of retro machines. This device has been deployed by Cursed Silicon and other users and has been successfully tested at-scale hosting 15 simultaneous users at the Seattle Interim Computer Festival retro computing event.
Another option (if you have one) is the Raspberry Pi. Every Pi version through the original Pi 1 to the current Pi 5 [https://openwrt.org/toh/raspberry_pi_foundation/raspberry_pi is supported by OpenWRT]. Adding a cheap USB LAN adapter makes this an attractive option if you have a spare "old Ras Pi laying around"
The third option is to run a virtual machine as your CGHMN gateway. We provide support primarily for '''''Proxmox''''' but other virtualization stacks such as VMware, Virtualbox and Hyper-V will work, but may require manual configuration by the user. '''This option is best suited for users wanting to run servers (websites, old game servers etc) as running old OSes in Proxmox comes with a significant graphics performance penalty'''
We recommend running the [https://openwrt.org/ OpenWRT] router distribution regardless of which above option you choose. This supports an enormous array of hardware (including running as a VM) and even comes with a [https://cghmn.snep.zip/connect.sh ready-made script] written by our network architect, Snep. This script can be run on a device running OpenWRT to configure it directly for access to CGHMN.
Once installed in either a VM or on a physical device such as the GL.iNet Shadow, the device can be SSH'd into and the following commands can be run to begin configuration for CGHMN access.
# <code>wget <nowiki>https://cghmn.snep.zip/connect.sh</nowiki></code>
# <code>ash setup-cghmn.sh</code>
# Follow the prompts!
Finally if you're particularly proficient with Linux or Networking (or both) you can opt to run your own hardware configured to your specifications. We don't directly provide support for vendors like Microtik, Unifi or others, but during the closed testing we've done in past, users have been able to set these vendor devices up and successfully connect. [https://github.com/CGHMN/config-examples Example configurations are available here] however are untested except by the user who submitted them. Please reach out to the committer for assistance if the configuration scripts do not work.
Once again, to clarify: CGHMN '''''does''''' '''''not specifically require using "real" vintage hardware''''' as doing so can be impractical for a number of reasons. A lot of users (including Cursed Silicon and others) use virtualization, particularly to run [[Services people are running|services on the network]] efficiently or to quickly test out applications and features. '''Connecting a modern computer (EG a Windows 10 or 11 PC) to the network while not disallowed will encounter a lot of issues due to the age of the servers and services it is communicating with and is discouraged'''
1d04ad6b29dd2cb99df633ea0ffdc76dc55dafa0
284
283
2025-10-07T20:24:08Z
CursedSilicon
1
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
Compu-Global-Hyper-Mega-Net is now in '''''OPEN BETA!''''' That means if you're reading this, you've either filled out our signup page and gotten sent an email, or stumbled across this page on the Wiki.
Either way, welcome!
So. To get ON Compu-Global-Hyper-Mega-Net (hereby referred to as CGHMN for easier reference) you'll need a few things.
# A retro computer/virtual machine or a device that can be ultimately terminated via ethernet. Using other networking standards like 802.11, Token Ring, AUI, BNC or others is totally fine, but you'll need to ultimately bridge them to Ethernet to talk to the device running Wireguard
# A device that can run the Wireguard and (optionally) Gretap protocols. Wireguard is a VPN stack that is used to encrypt traffic and connect your retro devices securely to the network over the internet. Gretap is used for tunneling "non TCP/IP" protocols, like IPX. Useful if you want to play DOOM or run other non-TCP/IP software, '''''but not required!'''''
# To '''have fun!''' Seriously. This project is meant to bring back the joy of the web as it existed in the 90's and 2000's. If you aren't having fun, we need to fix that.
For Step 2 you can use any kind of device that runs '''''Linux/BSD''''' such as a Raspberry Pi or others. Virtual Machines (such as Proxmox) are absolutely supported and encouraged!
For users looking to connect physical machines, you will need a hardware device. We recommend something like the [https://www.gl-inet.com/products/gl-ar300m/ GL.iNet Shadow]. This device retails for around $30~ US dollars on retailers such as Amazon and can push 40 megabits of bandwidth to CGHMN over Wireguard. This is more than sufficient for a significant number of retro machines. This device has been deployed by Cursed Silicon and other users and has been successfully tested at-scale hosting 15 simultaneous users at the Seattle Interim Computer Festival retro computing event.
Another option (if you have one) is the Raspberry Pi. Every Pi version through the original Pi 1 to the current Pi 5 [https://openwrt.org/toh/raspberry_pi_foundation/raspberry_pi is supported by OpenWRT]. Adding a cheap USB LAN adapter makes this an attractive option if you have a spare "old Ras Pi laying around"
The third option is to run a virtual machine as your CGHMN gateway. We provide support primarily for '''''Proxmox''''' but other virtualization stacks such as VMware, Virtualbox and Hyper-V will work, but may require manual configuration by the user. '''This option is best suited for users wanting to run servers (websites, old game servers etc) as running old OSes in Proxmox comes with a significant graphics performance penalty'''
We recommend running the [https://openwrt.org/ OpenWRT] router distribution regardless of which above option you choose. This supports an enormous array of hardware (including running as a VM) and even comes with a [https://cghmn.snep.zip/connect.sh ready-made script] written by our network architect, Snep. This script can be run on a device running OpenWRT to configure it directly for access to CGHMN.
Once installed in either a VM or on a physical device such as the GL.iNet Shadow, the device can be SSH'd into and the following commands can be run to begin configuration for CGHMN access.
# <code>wget <nowiki>https://cghmn.snep.zip/connect.sh</nowiki></code>
# <code>ash setup-cghmn.sh</code>
# Follow the prompts
# [https://signup.cghmn.org/ Send us your Wireguard] '''Public Key''' on the signup page so we can add you to the network!
Finally if you're particularly proficient with Linux or Networking (or both) you can opt to run your own hardware configured to your specifications. We don't directly provide support for vendors like Microtik, Unifi or others, but during the closed testing we've done in past, users have been able to set these vendor devices up and successfully connect. [https://github.com/CGHMN/config-examples Example configurations are available here] however are untested except by the user who submitted them. Please reach out to the committer for assistance if the configuration scripts do not work.
Once again, to clarify: CGHMN '''''does''''' '''''not specifically require using "real" vintage hardware''''' as doing so can be impractical for a number of reasons. A lot of users (including Cursed Silicon and others) use virtualization, particularly to run [[Services people are running|services on the network]] efficiently or to quickly test out applications and features. '''Connecting a modern computer (EG a Windows 10 or 11 PC) to the network while not disallowed will encounter a lot of issues due to the age of the servers and services it is communicating with and is discouraged'''
c41669b81a676ab1659d227d2db30f97b55fccbe
285
284
2025-10-07T20:50:22Z
CursedSilicon
1
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
Compu-Global-Hyper-Mega-Net is now in '''''OPEN BETA!''''' That means if you're reading this, you've either [https://signup.cghmn.org/ found our signup page], been sent an email, or just stumbled across this page on the Wiki.
Either way, welcome!
So. To get ON Compu-Global-Hyper-Mega-Net (hereby referred to as CGHMN for easier reference) you'll need a few things.
# A retro computer/virtual machine or a device that can be ultimately terminated via ethernet. Using other networking standards like 802.11, Token Ring, AUI, BNC or others is totally fine, but you'll need to ultimately bridge them to Ethernet to talk to the device running Wireguard
# A device that can run the Wireguard and (optionally) Gretap protocols. Wireguard is a VPN stack that is used to encrypt traffic and connect your retro devices securely to the network over the internet. Gretap is used for tunneling "non TCP/IP" protocols, like IPX. Useful if you want to play DOOM or run other non-TCP/IP software, '''''but not required!'''''
# To '''have fun!''' Seriously. This project is meant to bring back the joy of the web as it existed in the 90's and 2000's. If you aren't having fun, we need to fix that.
For Step 2 you can use any kind of device that runs '''''Linux/BSD''''' such as a Raspberry Pi or others. Virtual Machines (such as Proxmox) are absolutely supported and encouraged!
For users looking to connect physical machines, you will need a hardware device. We recommend something like the [https://www.gl-inet.com/products/gl-ar300m/ GL.iNet Shadow]. This device retails for around $30~ US dollars on retailers such as Amazon and can push 40 megabits of bandwidth to CGHMN over Wireguard. This is more than sufficient for a significant number of retro machines. This device has been deployed by Cursed Silicon and other users and has been successfully tested at-scale hosting 15 simultaneous users at the Seattle Interim Computer Festival retro computing event.
Another option (if you have one) is the Raspberry Pi. Every Pi version through the original Pi 1 to the current Pi 5 [https://openwrt.org/toh/raspberry_pi_foundation/raspberry_pi is supported by OpenWRT]. Adding a cheap USB LAN adapter makes this an attractive option if you have a spare "old Ras Pi laying around"
The third option is to run a virtual machine as your CGHMN gateway. We provide support primarily for '''''Proxmox''''' but other virtualization stacks such as VMware, Virtualbox and Hyper-V will work, but may require manual configuration by the user. '''This option is best suited for users wanting to run servers (websites, old game servers etc) as running old OSes in Proxmox comes with a significant graphics performance penalty'''
We recommend running the [https://openwrt.org/ OpenWRT] router distribution regardless of which above option you choose. This supports an enormous array of hardware (including running as a VM) and even comes with a [https://cghmn.snep.zip/connect.sh ready-made script] written by our network architect, Snep. This script can be run on a device running OpenWRT to configure it directly for access to CGHMN.
Once installed in either a VM or on a physical device such as the GL.iNet Shadow, the device can be SSH'd into and the following commands can be run to begin configuration for CGHMN access.
# <code>wget <nowiki>https://cghmn.snep.zip/connect.sh</nowiki></code>
# <code>ash setup-cghmn.sh</code>
# Follow the prompts
# [https://signup.cghmn.org/ Send us your Wireguard] '''Public Key''' on the signup page so we can add you to the network!
Finally if you're particularly proficient with Linux or Networking (or both) you can opt to run your own hardware configured to your specifications. We don't directly provide support for vendors like Microtik, Unifi or others, but during the closed testing we've done in past, users have been able to set these vendor devices up and successfully connect. [https://github.com/CGHMN/config-examples Example configurations are available here] however are untested except by the user who submitted them. Please reach out to the committer for assistance if the configuration scripts do not work.
Once again, to clarify: CGHMN '''''does''''' '''''not specifically require using "real" vintage hardware''''' as doing so can be impractical for a number of reasons. A lot of users (including Cursed Silicon and others) use virtualization, particularly to run [[Services people are running|services on the network]] efficiently or to quickly test out applications and features. '''Connecting a modern computer (EG a Windows 10 or 11 PC) to the network while not disallowed will encounter a lot of issues due to the age of the servers and services it is communicating with and is discouraged'''
4bbd44656cefe7bfbcd9d4f5b705e41adc8dc37d
Compu-Global-Hyper-Mega-Net
0
61
286
167
2025-10-10T17:37:57Z
CursedSilicon
1
Tweaked as we're in beta now
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
=== Preamble ===
Compu-Global-Hyper-Mega-Net (hereby shortened to '''''CGHMN''''' for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to "do" with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my "biting off far more than I can possibly chew" projects. Intended to be an intersection point between art, shitpost, rejection of "internet modernity", refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.
CGHMN is currently in '''''[[Signup|Open Beta]]'''''. Users can sign up and join the network along with their devices. While the network is totally solid, we need a large enough userbase to make it interesting for users to contribute! A bit of a chicken-and-egg problem. But hopefully one we can overcome.
An eventual goal is to provide "open" access to an era of the web that has been not so much "lost" as ''obliterated'' by capitalism. A space that can mimic "the vibe" of the late 1990's internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.
Mechanisms will be implemented to discourage (but not outright prevent) "modern systems" from accessing the network where possible, both for the security of users on the network and to try and further the "vibe" of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn't as "''fun''" for us!
=== So what's this all about? ===
CGHMN is a collaborative project aimed to create a late 1990's/early 2000's compatible "internet" for retro computing enthusiasts and their machines to connect to each other
=== Okay so how do I connect to it ===
You can sign up '''[[Signup|right now]]!''' to "beta test" the network
=== How fast is it? ===
Total internal network capacity is '''''500Mbps''''' (symmetric). This is mainly due to the limitations of the OVH server being rented. This speed may be raised or lowered depending on future federation with other members.
'''''Your''''' speed will likely depend on factors such as how fast your device can run Wireguard and your internet connection
=== Is this safe to use? I thought connecting old PC's to the internet was a bad idea! ===
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a ''hermetically sealed'' network. Users can only connect via the above methods '''and can only communicate with other devices on the network'''. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access '''permanently removed'''. With that said the usual rules about not downloading suspicious files and other "internet hygiene" rules still apply. While we don't expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.
=== How can I help? ===
A lot of folks have offered to donate server hosting which is wonderful. Though not (yet!) required. The two biggest things we need are
'''Donations to buy infrastructure''' (Particularly hard disks!) there's an Amazon Wishlist here that will get updated over time. https://www.amazon.com/hz/wishlist/ls/1W3S0E9IN7ZB7?ref_=wl_share
'''Volunteers who want to set up services'''. Want to come build a website? Run an old game server? Have some weird retro hardware you want to attach to the network? Please, reach out!
9b1bbf6d8c6f46dac3282e285850b5efd0c390d9
How to Get Connected
0
82
289
218
2025-10-21T06:36:28Z
CursedSilicon
1
OPEN beta!
wikitext
text/x-wiki
[[Category:Compu-Global-Hyper-Mega-Net]]
This is a quick and dirty "how do I get on CGHMN"
'''Since the service is in "open beta" these steps are a bit vague and manual. But over time as we figure out what works we'll add more connection methods and better documentation'''
=== Step 1: ===
[[Signup|'''Let us know you'd like to connect!''']]
(We'll need information from you such as your Wireguard Pubkey to let you connect to the network)[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]
=== Hardware requirements ===
To connect your retro machine(s) to the CGHMN, you'll need the following:
*'''An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.'''
* '''Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, <code>gretap</code> and <code>nftables</code>. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We're currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.'''
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. <s>A basic script to set up a Linux machine as a router is posted below</s> (TODO!).
* '''Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!'''
On the right is an example of what a CGHMN router setup could look like.
=== Get connected - With OpenWRT ===
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router: <code>wget https://cghmn.snep.zip/connect.sh</code>
# Run the following commands on the router:
## <code>ash setup-cghmn.sh install-pkgs</code>
## <code>ash setup-cghmn.sh init</code>
## You will be asked what network port you'd like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like '''lan''' or '''wan''' or which not already part of a bridge and enter the Linux interface name, e.g. <code>eth1</code>, then press <code>[Enter]</code> to continue. If your router only has two ports and you're using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the '''wan''' OpenWRT interface], remove the entire '''lan''' OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you're running on a router setup we can't really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as "[[wikipedia:Router_on_a_stick|router on a stick]]". Just enter the VLAN interface name here if you choose to go that route.
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server. If you cannot copy-paste, for example, because you're on a VM VNC console, you can run <code>ash setup-cghmn.sh pubkey-qr</code> to get a QR code printout of your public key, which can be scanned with a phone, tablet or software QR code parser to get the key as copy-pastable text.
# In return, you will receive a tunnel IPv4 address (<code>100.89.128.x/32</code>) and a routed IPv4 subnet (<code>100.96.x.0/24</code>) from us. These will be needed on the third and final step of the setup script:
## <code>ash setup-cghmn.sh set-tunnel-ip</code>
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.
=== Get Connected - Manually (Linux, Wireguard only, GRETAP follows shortly) ===
In case you want to setup a connection into the network manually, here are the required steps and information you should be needing:
* Generate a Wireguard private key and public key, this command writes a fresh Wireguard private key to <code>private-key</code> and the corresponsing public key to <code>public-key</code>:
$ wg genkey | tee private-key | wg pubkey > public-key
* NEVER share your private key, even with us! It should never be required outside of your own Wireguard setup!
* You will, however, need to share your public key with us. Send CursedSilicon or Snep on the Discord or via IRC a message including the public key and we'll add you to the tunnel.
* In return, you'll get two IP addresses from us: Your tunnel IP address, with which your router talks to our router, and a routed subnet, from which you can assign IPs to your own machines so they can talk to other CGHMN member devices on the network without NAT in the way.
* Next, you'll need to fill a Wireguard configuration file with the two IP addresses, like below:
[Interface]
PrivateKey = <Your private key goes here>
Address = <Your tunnel IP address goes here>/32
DNS = 100.89.128.0
MTU = 1420
[Peer]
PublicKey = k/QiJIbMakMKgTCHVt8/D+8k4DzRVM6U33F3gMZfRUg=
Endpoint = wg-admin.cursedsilicon.net:42070
AllowedIPs = 172.23.0.0/16, 100.89.128.0/22, 100.96.0.0/13
PersistentKeepalive = 15
* Save this file as <code>wg-cghmn.conf</code>, for example.
* Then, run <code>wg-quick up ./wg-cghmn.conf</code>, perhaps requiring <code>doas</code>/<code>sudo</code>, to bring the tunnel up and connect to the network!
This should bring whatever system you've set the tunnel up on onto the network and is now reachable for other members on the network, as long as the firewall on your device is congfigured accordingly, of course.
<nowiki>#</nowiki>TODO: Add example of routed subnet configuration, perhaps on a different Wiki site
=== Get connected - Server Side, the Admins Guide ===
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link
# Navigate to VPN -> Wireguard -> Peer Generator
# You will be asked to enter some data for the new peer, enter the following:
## '''Instance:''' <code>WG_Member</code>
## '''Endpoint:''' <code>wg-admin.cursedsilicon.net:42070</code>
## '''Name:''' <code>member.''<Nickname of the new member>''</code>
## '''Public Key:''' <code>''<their Wireguard public key they've sent over>''</code>
## '''Private Key:''' <code>''<blank>''</code>
## '''Address:''' ''<code><Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled></code>''
## '''Pre-Shared Key:''' <code>''<blank>''</code>
## '''Allowed IPs:''' <code>''<the same as Address>'', ''<their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]>''</code>
## '''Keepalive interval:''' ''<code><blank></code>''
## '''DNS Servers:''' <code>''<default value>''</code>
# Hit the "Store and generate next" button
# Navigate to VPN -> Wireguard -> Instances
# Hit the "Apply" button
# Do '''either one''' '''(not both!)''' of these steps, depending on if you can SSH into the GRETAP endpoint container:
## SSH into the CGHMN Proxmox Server and enter the command <code>pct enter 10403</code>
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with <code>ssh root@172.23.4.103</code>
# From there, run the following command: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh <member-tunnel-ip> <member-name></code> where you replace <code><member-tunnel-ip></code> with the IP tunnel address of the member as it was set above in the '''Address''' field, without the <code>/32</code> CIDR subnet mask, and replace the <code><member-name></code> with the same value you've entered above in the '''Name''' field. For example, like this: <code>bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test</code> This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. ''Ignore the fact it still says "VXLAN" everywhere, it does both.''
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.
# Rember to add the member and their tunnel and subnet IPs to the [[CGHMN-IP-Allocations|IP allocations page]] :)
==== But wait, what even ''is'' their routed subnet? ====
Each members routed subnet comes per default from the <code>100.96.0.0/13</code> IPv4 block and has a <code>/24</code> mask. This subnet is their "Retro LAN", to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn't make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn't want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say <code>100.89.128.'''6'''</code>, and put it into the third octet of the <code>100.96.0.0/13</code> IP block and replace the <code>/13</code> with <code>/24</code>, so you get <code>100.96.'''6'''.0/24</code>. That is their routed subnet, simple as that!
=== After you get connected ===
There are a few optional things you might want to do.
==== Network mailing list ====
There is a mailing list you can subscribe to if you want to be notified about things that may affect CGHMN or core services. You can subscribe to the list here: https://berwick-upon-tweed.cobaltqu.be/postorius/lists/cghmn-announce.lists.cobaltqu.be/.
If you need to post to the list, you will need to subscribe before you can be added to the list of poster.
==== Explore things available on the network ====
There is a collection of [[services people are running]] - things like email/hosting/chat/search/etc.
8f6269b0bcaf9a14a16a408f717b68cd5dd2f86b
CGHMN NAT and Firewalls
0
95
290
2025-10-26T06:25:41Z
CursedSilicon
1
Still a WIP but this is as much as I could write before sickness took over and I passed out
wikitext
text/x-wiki
[[Compu-Global-Hyper-Mega-Net|Compu-Global-Hyper-Mega-Net (CGHMN)]] exists in a difficult kind of space. We aim to emulate "the old web". A time of roughly 1995 to around 2005 or so. Before "Web 2.0" took off.
At time of writing that might not sound like too big a problem. After all, Windows 10 came out in 2015 and now it's 2025. But your 4th gen Core i7 PC is still perfectly usable. Just install Linux, right?
Unfortunately for us now we live at the end of history. In 1995 however the "World Wide Web" was in its infancy in such a way that every single year brought quantum technological leaps over the previous year. By the end of the millennium we'd gone from rudimentary analog Dial-Up services to Wireless Networking being accessible to consumers (Apple's AirPort routers alone showed up in 1999)
However on a technical level this began to create severe technical issues. The internet as it was originally designed assumed simple "end-to-end" connectivity. Every computer on the internet could (more or less) talk to another computer without exception.
This created two major problems.
The first one was IP exhaustion. Even by the 1990's there was an understanding that there simply wouldn't be enough IP addresses for everyone on the internet. This needed to be fixed, and fast! This lead to IPv6 as an evolutionary upgrade (a problem the internet still struggles to even deploy in 2025, despite being ratified in 1998)
The second, and much more obvious problem was security. By the year 2000 it was obviously apparent that every machine being able to talk to every other machine on Earth was a problem. Particularly when the dominant operating system these machines ran was what could be charitably described as..."not great" in terms of security. In the 2000's this would only escalate as the "[https://en.wikipedia.org/wiki/ILOVEYOU ILOVEYOU]" worm gave way to some of Windows XP's greatest hits, [https://en.wikipedia.org/wiki/Blaster_(computer_worm) Blaster], [https://en.wikipedia.org/wiki/Sasser_(computer_worm) Sasser], [https://en.wikipedia.org/wiki/Mydoom Mydoom], [https://en.wikipedia.org/wiki/Nimda Nimda] and [https://en.wikipedia.org/wiki/Conficker Conficker]. Among others.
A fortunate side-effect at the time of the explosive growth of computers on the internet was the institution of "Network Address Translation" or "NAT". In laymans terms this allows a bunch of computers to all sit behind a single IP address using a device such as a router. This technology is so ubiquitous that even in 2025 at time of writing it's still the defacto standard for computers and other devices to access the modern internet through.
'''''However,''''' this technology came at a cost. The internet was originally predicated on the idea that every computer had its own, unique, IP address. NAT removed that assumption. And, in doing so, programs broke. Sometimes completely with services like FTP, sometimes in subtle ways. Like being unable to connect certain game players in a StarCraft lobby.
The problem that NAT inadvertently introduced was that while "outbound" traffic would work fine. Such as you connecting to a website. If a program needed to receive data on your local computer, it could no longer simply sit and wait for a connection from a remote PC. An example would be AOL Instant Messenger (AIM). Chats between users are routed through a remote server. However to save on bandwidth, sending files happens directly between users. If user A is behind NAT. User B won't be able to "see" the computer and send data to it as desired.
The "solution" to this problem is known as '''''Port Forwarding'''''. You tell your router that [these ports] *always* go to "this PC on the LAN" exclusively.
d6e6f6783be91a0fcb105b97e603becdb526a755
291
290
2025-10-26T22:42:51Z
CursedSilicon
1
wikitext
text/x-wiki
[[Compu-Global-Hyper-Mega-Net|Compu-Global-Hyper-Mega-Net (CGHMN)]] exists in a difficult kind of space. We aim to emulate "the old web". A time of roughly "1995 to around 2005 or so". Before "Web 2.0" took off. Though, really we support anything that speaks ethernet and (usually) TCP/IP. We've had devices as old as a DOS 286 PC clone connected successfully.
Unfortunately for us now we live at the end of history. In 1995 the "World Wide Web" was in its infancy in such a way that every single year brought quantum technological leaps over the previous year. By the end of the millennium we'd gone from rudimentary analog Dial-Up services to ''Wireless Networking'' being accessible to consumers (Apple's AirPort routers alone showed up in 1999)
However on a technical level this began to create severe issues. The internet as it was originally designed assumed simple "end-to-end" connectivity. Every computer on the internet could (more or less) talk to another computer without exception.
'''This created two major problems.'''
The first one was IP exhaustion. Even by the 1990's there was an understanding that there simply wouldn't be enough IP addresses for everyone on the internet. This needed to be fixed, and fast! This lead to IPv6 as an evolutionary upgrade (a problem the internet still struggles to even deploy in 2025, despite being ratified in 1998)
The second, and much more obvious problem was security. By the year 2000 it was obviously apparent that every machine being able to talk to every other machine on Earth was a problem. Particularly when the dominant operating system these machines ran was what could be charitably described as..."not great" in terms of security. In the 2000's this would only escalate as the "[[wikipedia:ILOVEYOU|ILOVEYOU]]" worm gave way to some of Windows XP's greatest hits, [[wikipedia:Blaster_(computer_worm)|Blaster]], [[wikipedia:Sasser_(computer_worm)|Sasser]], [[wikipedia:Mydoom|Mydoom]], [[wikipedia:Nimda|Nimda]] and [[wikipedia:Conficker|Conficker]]. Among others.
A remedy proposed in the 1990's to the issue of IP exhaustion was "Network Address Translation" or "NAT". In layman terms this allows a bunch of computers to all sit behind a single IP address using a device such as a router. This technology is so ubiquitous that even in 2025 at time of writing it's still the defacto standard for home and business computers and other devices to access the modern internet.
'''''However,''''' this technology came at a cost. The internet as most folks imagine (or remember it) was originally built on the idea that every computer had its own, unique, IP address. NAT broke that assumption. And, in doing so, programs broke. Sometimes completely with services like FTP, sometimes in subtle ways. Like being unable to connect certain game players in a StarCraft lobby.
The problem that NAT introduced was that while "outbound" traffic would work fine. Such as you connecting to a website. If a program needed to ''receive'' data on your local computer, it could no longer simply sit and wait for a connection from a remote PC. An example would be AOL Instant Messenger (AIM). Chats between users are routed through a remote server. You and the Other User talk to a central server and it handles sending messages to-and-fro. ''However'' to save on bandwidth, sending files happens directly between users. If either user is behind NAT. They won't be able to "see" the remote computer and send data to it as desired.
The "solution" to this problem is known as '''''Port Forwarding'''''. You tell your router that [these ports] *always* go to [this IP address on the LAN] exclusively. This (mostly) solved the problem at the time. Additional solutions were proposed such as "UPnP" to allow programs to ask the router to forward ports for them dynamically. However, support for this was few-and-far-between (mostly BitTorrent clients) and in time it faded into oblivion.
As stated before, we live at the end of history however. Which means we've got historical hindsight on the problems that existed
d66e48767373856b44c6a40094b83cfe2e29e944
292
291
2025-10-26T22:57:10Z
CursedSilicon
1
wikitext
text/x-wiki
== A brief history on how the internet worked in the 1990's ==
[[Compu-Global-Hyper-Mega-Net|Compu-Global-Hyper-Mega-Net (CGHMN)]] exists in a difficult kind of space. We aim to emulate "the old web". A time of roughly "1995 to around 2005 or so". A sort of nebulous "Before Web 2.0 took off" kind of period. Though, really we support anything that speaks ethernet and (usually) TCP/IP. We've had devices as old as a DOS 286 PC clone connected successfully. Most users trend toward Windows XP as their platform of choice due to its relative flexibility and widespread hardware and software support
Unfortunately for all of us we live at the "[[wikipedia:End_of_history|end of history]]". In 1995 the "World Wide Web" was in its infancy in such a way that every single year brought quantum technological leaps over the previous year. By the end of the millennium we'd gone from rudimentary analog Dial-Up services to ''Wireless Networking'' being accessible to consumers (Apple's AirPort routers alone showed up in 1999)
However on a technical level this began to create severe issues. The internet as it was originally designed assumed simple "end-to-end" connectivity. Every computer on the internet could (more or less) talk to another computer without exception.
'''This created two major problems.'''
The first one was IP exhaustion. Even by the 1990's there was an understanding that there simply wouldn't be enough IP addresses for everyone on the internet. This needed to be fixed, and fast! This lead to IPv6 as an evolutionary upgrade (a problem the internet still struggles to even deploy in 2025, despite being ratified in 1998)
The second, and much more obvious problem was security. By the year 2000 it was obviously apparent that every machine being able to talk to every other machine on Earth was a problem. Particularly when the dominant operating system these machines ran was what could be charitably described as..."not great" in terms of security. In the 2000's this would only escalate as the "[[wikipedia:ILOVEYOU|ILOVEYOU]]" worm gave way to some of Windows XP's greatest hits, [[wikipedia:Blaster_(computer_worm)|Blaster]], [[wikipedia:Sasser_(computer_worm)|Sasser]], [[wikipedia:Mydoom|Mydoom]], [[wikipedia:Nimda|Nimda]] and [[wikipedia:Conficker|Conficker]]. Among others.
A remedy proposed in the 1990's to the issue of IP exhaustion was "Network Address Translation" or "NAT". In layman terms this allows a bunch of computers to all sit behind a single IP address using a device such as a router. This technology is so ubiquitous that even in 2025 at time of writing it's still the defacto standard for home and business computers and other devices to access the modern internet.
'''''However,''''' this technology came at a cost. The internet as most folks imagine (or remember it) was originally built on the idea that every computer had its own, unique, IP address. NAT broke that assumption. And, in doing so, programs broke. Sometimes completely with services like FTP, sometimes in subtle ways. Like being unable to connect certain game players in a StarCraft lobby.
The problem that NAT introduced was that while "outbound" traffic would work fine. Such as you connecting to a website. If a program needed to ''receive'' data on your local computer, it could no longer simply sit and wait for a connection from a remote PC. An example would be AOL Instant Messenger (AIM). Chats between users are routed through a remote server. You and the Other User talk to a central server and it handles sending messages to-and-fro. ''However'' to save on bandwidth, sending files happens directly between users. If either user is behind NAT. They won't be able to "see" the remote computer and send data to it as desired.
The "solution" to this problem is known as '''''Port Forwarding'''''. You tell your router that [these ports] *always* go to [this IP address on the LAN] exclusively. This (mostly) solved the problem at the time. Additional solutions were proposed such as "UPnP" to allow programs to ask the router to forward ports for them dynamically. However, support for this was few-and-far-between (mostly BitTorrent clients) and in time it faded into oblivion.
As stated before, we live at the end of history. Which means we have the benefit of looking back on what was, and understanding the flaws. Which (finally) brings us to the point of this wiki page.
== Okay but what does that have to do with CGHMN? ==
Every CGHMN user is allocated a /24 block of IP's. Effectively every user has 253 IP addresses to use as they'd like. This was a deliberate decision both to maximize the amount of freedom users would have to connect ALL their retro equipment if desired, and to try and allow direct end-to-end connectivity that the old web "expects"
'''''However''''' because we have the benefit of historical hindsight. Having directly allocated IP addresses does not mean that your devices are directly exposed to the network. By default (if using OpenWRT with Snep's setup script) your IP block will be ''firewalled'' against incoming connections. This is a necessary security measure because the very nature of the
4872ea46e776ec6b907de63f7508580a07336767
293
292
2025-10-26T22:57:54Z
CursedSilicon
1
wikitext
text/x-wiki
=== A brief history on how the internet worked in the 1990's ===
[[Compu-Global-Hyper-Mega-Net|Compu-Global-Hyper-Mega-Net (CGHMN)]] exists in a difficult kind of space. We aim to emulate "the old web". A time of roughly "1995 to around 2005 or so". A sort of nebulous "Before Web 2.0 took off" kind of period. Though, really we support anything that speaks ethernet and (usually) TCP/IP. We've had devices as old as a DOS 286 PC clone connected successfully. Most users trend toward Windows XP as their platform of choice due to its relative flexibility and widespread hardware and software support
Unfortunately for all of us we live at the "[[wikipedia:End_of_history|end of history]]". In 1995 the "World Wide Web" was in its infancy in such a way that every single year brought quantum technological leaps over the previous year. By the end of the millennium we'd gone from rudimentary analog Dial-Up services to ''Wireless Networking'' being accessible to consumers (Apple's AirPort routers alone showed up in 1999)
However on a technical level this began to create severe issues. The internet as it was originally designed assumed simple "end-to-end" connectivity. Every computer on the internet could (more or less) talk to another computer without exception.
'''This created two major problems.'''
The first one was IP exhaustion. Even by the 1990's there was an understanding that there simply wouldn't be enough IP addresses for everyone on the internet. This needed to be fixed, and fast! This lead to IPv6 as an evolutionary upgrade (a problem the internet still struggles to even deploy in 2025, despite being ratified in 1998)
The second, and much more obvious problem was security. By the year 2000 it was obviously apparent that every machine being able to talk to every other machine on Earth was a problem. Particularly when the dominant operating system these machines ran was what could be charitably described as..."not great" in terms of security. In the 2000's this would only escalate as the "[[wikipedia:ILOVEYOU|ILOVEYOU]]" worm gave way to some of Windows XP's greatest hits, [[wikipedia:Blaster_(computer_worm)|Blaster]], [[wikipedia:Sasser_(computer_worm)|Sasser]], [[wikipedia:Mydoom|Mydoom]], [[wikipedia:Nimda|Nimda]] and [[wikipedia:Conficker|Conficker]]. Among others.
A remedy proposed in the 1990's to the issue of IP exhaustion was "Network Address Translation" or "NAT". In layman terms this allows a bunch of computers to all sit behind a single IP address using a device such as a router. This technology is so ubiquitous that even in 2025 at time of writing it's still the defacto standard for home and business computers and other devices to access the modern internet.
'''''However,''''' this technology came at a cost. The internet as most folks imagine (or remember it) was originally built on the idea that every computer had its own, unique, IP address. NAT broke that assumption. And, in doing so, programs broke. Sometimes completely with services like FTP, sometimes in subtle ways. Like being unable to connect certain game players in a StarCraft lobby.
The problem that NAT introduced was that while "outbound" traffic would work fine. Such as you connecting to a website. If a program needed to ''receive'' data on your local computer, it could no longer simply sit and wait for a connection from a remote PC. An example would be AOL Instant Messenger (AIM). Chats between users are routed through a remote server. You and the Other User talk to a central server and it handles sending messages to-and-fro. ''However'' to save on bandwidth, sending files happens directly between users. If either user is behind NAT. They won't be able to "see" the remote computer and send data to it as desired.
The "solution" to this problem is known as '''''Port Forwarding'''''. You tell your router that [these ports] *always* go to [this IP address on the LAN] exclusively. This (mostly) solved the problem at the time. Additional solutions were proposed such as "UPnP" to allow programs to ask the router to forward ports for them dynamically. However, support for this was few-and-far-between (mostly BitTorrent clients) and in time it faded into oblivion.
As stated before, we live at the end of history. Which means we have the benefit of looking back on what was, and understanding the flaws. Which (finally) brings us to the point of this wiki page.
==== Okay but what does that have to do with CGHMN? ====
Every CGHMN user is allocated a /24 block of IP's. Effectively every user has 253 IP addresses to use as they'd like. This was a deliberate decision both to maximize the amount of freedom users would have to connect ALL their retro equipment if desired, and to try and allow direct end-to-end connectivity that the old web "expects"
'''''However''''' because we have the benefit of historical hindsight. Having directly allocated IP addresses does not mean that your devices are directly exposed to the network. By default (if using OpenWRT with Snep's setup script) your IP block will be ''firewalled'' against incoming connections. This is a necessary security measure because the very nature of the
1dbe5c99f13caf6b2639fc88e8726e2af91ca8b9
294
293
2025-10-26T23:00:08Z
CursedSilicon
1
/* A brief history on how the internet worked in the 1990's */
wikitext
text/x-wiki
=== A brief history on how the internet worked in the 1990's ===
[[Compu-Global-Hyper-Mega-Net|Compu-Global-Hyper-Mega-Net (CGHMN)]] exists in a difficult kind of space. We aim to emulate "the old web". A time of roughly "1995 to around 2005 or so". A sort of nebulous "Before Web 2.0 took off" kind of period. Though, really we support anything that speaks ethernet and (usually) TCP/IP. We've had devices as old as a DOS 286 PC clone connected successfully. Most users trend toward Windows XP as their platform of choice due to its relative flexibility and widespread hardware and software support
Unfortunately for all of us we live at the "[[wikipedia:End_of_history|end of history]]". In 1995 the "World Wide Web" was in its infancy in such a way that every single year brought quantum technological leaps over the previous year. By the end of the millennium we'd gone from rudimentary analog Dial-Up services to ''Wireless Networking'' being accessible to consumers (Apple's AirPort routers alone showed up in 1999)
However on a technical level this began to create severe issues. The internet as it was originally designed assumed simple "end-to-end" connectivity. Every computer on the internet could (more or less) talk to another computer without exception.
'''This created two major problems.'''
The first one was IP exhaustion. Even by the 1990's there was an understanding that there simply wouldn't be enough IP addresses for everyone on the internet. This needed to be fixed, and fast! This lead to IPv6 as an evolutionary upgrade (a problem the internet still struggles to even deploy in 2025, despite being ratified in 1998)
The second, and much more obvious problem was security. By the year 2000 it was obviously apparent that every machine being able to talk to every other machine on Earth was a problem. Particularly when the dominant operating system these machines ran was what could be charitably described as..."not great" in terms of security. In the 2000's this would only escalate as the "[[wikipedia:ILOVEYOU|ILOVEYOU]]" worm gave way to some of Windows XP's greatest hits, [[wikipedia:Blaster_(computer_worm)|Blaster]], [[wikipedia:Sasser_(computer_worm)|Sasser]], [[wikipedia:Mydoom|Mydoom]], [[wikipedia:Nimda|Nimda]] and [[wikipedia:Conficker|Conficker]]. Among others.
A remedy proposed in the 1990's to the issue of IP exhaustion was "Network Address Translation" or "NAT". In layman terms this allows a bunch of computers to all sit behind a single IP address using a device such as a router. This technology is so ubiquitous that even in 2025 at time of writing it's still the defacto standard for home and business computers and other devices to access the modern internet.
'''''However,''''' this technology came at a cost. The internet as most folks imagine (or remember it) was originally built on the idea that every computer had its own, unique, IP address. NAT broke that assumption. And, in doing so, programs broke. Sometimes completely with services like FTP, sometimes in subtle ways. Like being unable to connect certain game players in a StarCraft lobby.
The problem that NAT introduced was that while "outbound" traffic would work fine. Such as you connecting to a website. If a program needed to ''receive'' data on your local computer, it could no longer simply sit and wait for a connection from a remote PC. An example would be AOL Instant Messenger (AIM). Chats between users are routed through a remote server. You and the Other User talk to a central server and it handles sending messages to-and-fro. ''However'' to save on bandwidth, sending files happens directly between users. If either user is behind NAT. They won't be able to "see" the remote computer and send data to it as desired.
The "solution" to this problem is known as '''''Port Forwarding'''''. You tell your router that [these ports] *always* go to [this IP address on the LAN] exclusively. This (mostly) solved the problem at the time. Additional solutions were proposed such as "UPnP" to allow programs to ask the router to forward ports for them dynamically. However, support for this was few-and-far-between (mostly BitTorrent clients) and in time it faded into oblivion.
As stated before, we live at the end of history. Which means we have the benefit of looking back on what was, and understanding the flaws. Which (finally) brings us to the point of this wiki page.
=== Okay but what does that have to do with CGHMN? ===
Every CGHMN user is allocated a /24 block of IP's. Effectively every user has 253 IP addresses to use as they'd like. This was a deliberate decision both to maximize the amount of freedom users would have to connect ALL their retro equipment if desired, and to try and allow direct end-to-end connectivity that the old web "expects"
'''''However''''' because we have the benefit of historical hindsight. Having directly allocated IP addresses does not mean that your devices are directly exposed to the network. By default (if using OpenWRT with Snep's setup script) your IP block will be ''firewalled'' against incoming connections. This is a necessary security measure because the very nature of the
=== So, what stuff breaks, exactly? ===
=== How do I opt-out out? ===
dab03d5ff840ea15616708fc15000848e80536e8
295
294
2025-10-26T23:16:08Z
CursedSilicon
1
wikitext
text/x-wiki
=== A brief history on how the internet worked in the 1990's ===
[[Compu-Global-Hyper-Mega-Net|Compu-Global-Hyper-Mega-Net (CGHMN)]] exists in a difficult kind of space. We aim to emulate "the old web". A time of roughly "1995 to around 2005 or so". A sort of nebulous "Before Web 2.0 took off" kind of period. Though, really we support anything that speaks ethernet and (usually) TCP/IP. We've had devices as old as a DOS 286 PC clone connected successfully. Most users trend toward Windows XP as their platform of choice due to its relative flexibility and widespread hardware and software support
Unfortunately for all of us we live at the "[[wikipedia:End_of_history|end of history]]". In 1995 the "World Wide Web" was in its infancy in such a way that every single year brought quantum technological leaps over the previous year. By the end of the millennium we'd gone from rudimentary analog Dial-Up services to ''Wireless Networking'' being accessible to consumers (Apple's AirPort routers alone showed up in 1999)
However on a technical level this began to create severe issues. The internet as it was originally designed assumed simple "end-to-end" connectivity. Every computer on the internet could (more or less) talk to another computer without exception.
<big>'''This created two major problems:'''</big>
The first one was IP exhaustion. Even by the 1990's there was an understanding that there simply wouldn't be enough IP addresses for everyone on the internet. This needed to be fixed, and fast! This lead to IPv6 as an evolutionary upgrade (a problem the internet still struggles to even deploy in 2025, despite being ratified in 1998)
The second, and much more obvious problem was security. By the year 2000 it was obviously apparent that every machine being able to talk to every other machine on Earth was a problem. Particularly when the dominant operating system these machines ran was what could be charitably described as..."not great" in terms of security. In the 2000's this would only escalate as the "[[wikipedia:ILOVEYOU|ILOVEYOU]]" worm gave way to some of Windows XP's greatest hits, [[wikipedia:Blaster_(computer_worm)|Blaster]], [[wikipedia:Sasser_(computer_worm)|Sasser]], [[wikipedia:Mydoom|Mydoom]], [[wikipedia:Nimda|Nimda]] and [[wikipedia:Conficker|Conficker]]. Among others.
A remedy proposed in the 1990's to the issue of IP exhaustion was "Network Address Translation" or "NAT". In layman terms this allows a bunch of computers to all sit behind a single IP address using a device such as a router. This technology is so ubiquitous that even in 2025 at time of writing it's still the defacto standard for home and business computers and other devices to access the modern internet.
'''''However,''''' this technology came at a cost. The internet as most folks imagine (or remember it) was originally built on the idea that every computer had its own, unique, IP address. NAT broke that assumption. And, in doing so, programs broke. Sometimes completely with services like FTP, sometimes in subtle ways. Like being unable to connect certain game players in a StarCraft lobby.
The problem that NAT introduced was that while "outbound" traffic would work fine. Such as you connecting to a website. If a program needed to ''receive'' data on your local computer, it could no longer simply sit and wait for a connection from a remote PC. An example would be AOL Instant Messenger (AIM). Chats between users are routed through a remote server. You and the Other User talk to a central server and it handles sending messages to-and-fro. ''However'' to save on bandwidth, sending files happens directly between users. If either user is behind NAT. They won't be able to "see" the remote computer and send data to it as desired.
The "solution" to this problem is known as '''''Port Forwarding'''''. You tell your router that [these ports] *always* go to [this IP address on the LAN] exclusively. This (mostly) solved the problem at the time. Additional solutions were proposed such as "UPnP" to allow programs to ask the router to forward ports for them dynamically. However, support for this was few-and-far-between (mostly BitTorrent clients) and in time it faded into oblivion.
As stated before, we live at the end of history. Which means we have the benefit of looking back on what was, and understanding the flaws. Which (finally) brings us to the point of this wiki page.
=== Okay but what does that have to do with CGHMN? ===
Every CGHMN user is allocated a /24 block of IP's. Effectively every user has 253 IP addresses to use as they'd like. This was a deliberate decision both to maximize the amount of freedom users would have to connect ALL their retro equipment if desired, and to try and allow direct end-to-end connectivity that the old web "expects"
'''''However''''' because we have the benefit of historical hindsight. Having directly allocated IP addresses does not mean that your devices are directly exposed to the network. By default (if using OpenWRT with Snep's setup script) your IP block will be ''firewalled'' against incoming connections. This is a necessary security measure because the very nature of the
=== So, what stuff breaks, exactly? ===
There's no definitive list of "what" breaks under this decision. A broad (but by no means encompassing) list of things that ''won't work'' are
- Servers. You won't be able to run any kind of server or service (EG: hosting your own website, running a game server) without the ability for users to connect to it
- Games that '''''don't''''' use a server browser. Games like Quake or Halo where users all connect to a single server to play on will work (provided the server is either port forwarded or the firewall is disabled) but other games such as StarCraft or Command & Conquer have players connect dynamically connect to a single player as the "host" (typically the player that created the game lobby). These will not work
- FTP! FTP is such an old protocol that the '''''remote server''''' initiates a connection back to the client and then begins sending files that way. This was fixed in [https://datatracker.ietf.org/doc/html/rfc1579 RFC 1579] with the "Firewall-Friendly FTP" proposal. Unfortunately despite being proposed in February 1994, some software such as Microsoft FrontPage did not enable it until 2003(!)
- AIM file transfers. As described already on this wiki page, AIM (and IRC and other chat clients such as MSN or Yahoo) all use a direct connection between two computers to send files across a network
=== How do I opt-out out? ===
<br>
<br>
<big>'''It should be made completely clear that opting out of using the OpenWRT firewall is not a decision that should be made lightly. We cannot explicitly guarantee that a user won't accidentally (or intentionally) release a malware Pandora's Box on the network. Blaster/Sasser/Mydoom/ILOVEYOU/etc are still real malware samples that can be downloaded and executed either by mistake or by a malicious user. We highly recommend installing any and all software patches that were (or are) available for your chosen systems before doing this!'''</big>
There are two "modes" of opt-out available. Depending on user preference.
The most drastic is simply to disable OpenWRT's firewall completely. This means any machine you plug in will have direct access to the network and any other devices on the network will be able to directly access it. If you choose this option we highly recommend putting any machines behind a (preferably modern!) Firewall and then port forwarding as necessary
The other option is to set a static (fixed) IP address on the device you want to run servers or play games from. Once this is done you can access the OpenWRT Firewall page (Network -> Firewall) and manually forward the required ports for that specific host.
fced1f991d1cdfb3ca970827261b32391f46b792
296
295
2025-10-26T23:16:47Z
CursedSilicon
1
wikitext
text/x-wiki
= Or "a treatise on setting up a retro network" =
=== A brief history on how the internet worked in the 1990's ===
[[Compu-Global-Hyper-Mega-Net|Compu-Global-Hyper-Mega-Net (CGHMN)]] exists in a difficult kind of space. We aim to emulate "the old web". A time of roughly "1995 to around 2005 or so". A sort of nebulous "Before Web 2.0 took off" kind of period. Though, really we support anything that speaks ethernet and (usually) TCP/IP. We've had devices as old as a DOS 286 PC clone connected successfully. Most users trend toward Windows XP as their platform of choice due to its relative flexibility and widespread hardware and software support
Unfortunately for all of us we live at the "[[wikipedia:End_of_history|end of history]]". In 1995 the "World Wide Web" was in its infancy in such a way that every single year brought quantum technological leaps over the previous year. By the end of the millennium we'd gone from rudimentary analog Dial-Up services to ''Wireless Networking'' being accessible to consumers (Apple's AirPort routers alone showed up in 1999)
However on a technical level this began to create severe issues. The internet as it was originally designed assumed simple "end-to-end" connectivity. Every computer on the internet could (more or less) talk to another computer without exception.
<big>'''This created two major problems:'''</big>
The first one was IP exhaustion. Even by the 1990's there was an understanding that there simply wouldn't be enough IP addresses for everyone on the internet. This needed to be fixed, and fast! This lead to IPv6 as an evolutionary upgrade (a problem the internet still struggles to even deploy in 2025, despite being ratified in 1998)
The second, and much more obvious problem was security. By the year 2000 it was obviously apparent that every machine being able to talk to every other machine on Earth was a problem. Particularly when the dominant operating system these machines ran was what could be charitably described as..."not great" in terms of security. In the 2000's this would only escalate as the "[[wikipedia:ILOVEYOU|ILOVEYOU]]" worm gave way to some of Windows XP's greatest hits, [[wikipedia:Blaster_(computer_worm)|Blaster]], [[wikipedia:Sasser_(computer_worm)|Sasser]], [[wikipedia:Mydoom|Mydoom]], [[wikipedia:Nimda|Nimda]] and [[wikipedia:Conficker|Conficker]]. Among others.
A remedy proposed in the 1990's to the issue of IP exhaustion was "Network Address Translation" or "NAT". In layman terms this allows a bunch of computers to all sit behind a single IP address using a device such as a router. This technology is so ubiquitous that even in 2025 at time of writing it's still the defacto standard for home and business computers and other devices to access the modern internet.
'''''However,''''' this technology came at a cost. The internet as most folks imagine (or remember it) was originally built on the idea that every computer had its own, unique, IP address. NAT broke that assumption. And, in doing so, programs broke. Sometimes completely with services like FTP, sometimes in subtle ways. Like being unable to connect certain game players in a StarCraft lobby.
The problem that NAT introduced was that while "outbound" traffic would work fine. Such as you connecting to a website. If a program needed to ''receive'' data on your local computer, it could no longer simply sit and wait for a connection from a remote PC. An example would be AOL Instant Messenger (AIM). Chats between users are routed through a remote server. You and the Other User talk to a central server and it handles sending messages to-and-fro. ''However'' to save on bandwidth, sending files happens directly between users. If either user is behind NAT. They won't be able to "see" the remote computer and send data to it as desired.
The "solution" to this problem is known as '''''Port Forwarding'''''. You tell your router that [these ports] *always* go to [this IP address on the LAN] exclusively. This (mostly) solved the problem at the time. Additional solutions were proposed such as "UPnP" to allow programs to ask the router to forward ports for them dynamically. However, support for this was few-and-far-between (mostly BitTorrent clients) and in time it faded into oblivion.
As stated before, we live at the end of history. Which means we have the benefit of looking back on what was, and understanding the flaws. Which (finally) brings us to the point of this wiki page.
=== Okay but what does that have to do with CGHMN? ===
Every CGHMN user is allocated a /24 block of IP's. Effectively every user has 253 IP addresses to use as they'd like. This was a deliberate decision both to maximize the amount of freedom users would have to connect ALL their retro equipment if desired, and to try and allow direct end-to-end connectivity that the old web "expects"
'''''However''''' because we have the benefit of historical hindsight. Having directly allocated IP addresses does not mean that your devices are directly exposed to the network. By default (if using OpenWRT with Snep's setup script) your IP block will be ''firewalled'' against incoming connections. This is a necessary security measure because the very nature of the
=== So, what stuff breaks, exactly? ===
There's no definitive list of "what" breaks under this decision. A broad (but by no means encompassing) list of things that ''won't work'' are
- Servers. You won't be able to run any kind of server or service (EG: hosting your own website, running a game server) without the ability for users to connect to it
- Games that '''''don't''''' use a server browser. Games like Quake or Halo where users all connect to a single server to play on will work (provided the server is either port forwarded or the firewall is disabled) but other games such as StarCraft or Command & Conquer have players connect dynamically connect to a single player as the "host" (typically the player that created the game lobby). These will not work
- FTP! FTP is such an old protocol that the '''''remote server''''' initiates a connection back to the client and then begins sending files that way. This was fixed in [https://datatracker.ietf.org/doc/html/rfc1579 RFC 1579] with the "Firewall-Friendly FTP" proposal. Unfortunately despite being proposed in February 1994, some software such as Microsoft FrontPage did not enable it until 2003(!)
- AIM file transfers. As described already on this wiki page, AIM (and IRC and other chat clients such as MSN or Yahoo) all use a direct connection between two computers to send files across a network
=== How do I opt-out out? ===
<br>
<br>
<big>'''It should be made completely clear that opting out of using the OpenWRT firewall is not a decision that should be made lightly. We cannot explicitly guarantee that a user won't accidentally (or intentionally) release a malware Pandora's Box on the network. Blaster/Sasser/Mydoom/ILOVEYOU/etc are still real malware samples that can be downloaded and executed either by mistake or by a malicious user. We highly recommend installing any and all software patches that were (or are) available for your chosen systems before doing this!'''</big>
There are two "modes" of opt-out available. Depending on user preference.
The most drastic is simply to disable OpenWRT's firewall completely. This means any machine you plug in will have direct access to the network and any other devices on the network will be able to directly access it. If you choose this option we highly recommend putting any machines behind a (preferably modern!) Firewall and then port forwarding as necessary
The other option is to set a static (fixed) IP address on the device you want to run servers or play games from. Once this is done you can access the OpenWRT Firewall page (Network -> Firewall) and manually forward the required ports for that specific host.
339616b75bd7c426a85f1e5b4e956d8cf22fdc0d
297
296
2025-10-26T23:17:15Z
CursedSilicon
1
wikitext
text/x-wiki
=== A brief history on how the internet worked in the 1990's ===
[[Compu-Global-Hyper-Mega-Net|Compu-Global-Hyper-Mega-Net (CGHMN)]] exists in a difficult kind of space. We aim to emulate "the old web". A time of roughly "1995 to around 2005 or so". A sort of nebulous "Before Web 2.0 took off" kind of period. Though, really we support anything that speaks ethernet and (usually) TCP/IP. We've had devices as old as a DOS 286 PC clone connected successfully. Most users trend toward Windows XP as their platform of choice due to its relative flexibility and widespread hardware and software support
Unfortunately for all of us we live at the "[[wikipedia:End_of_history|end of history]]". In 1995 the "World Wide Web" was in its infancy in such a way that every single year brought quantum technological leaps over the previous year. By the end of the millennium we'd gone from rudimentary analog Dial-Up services to ''Wireless Networking'' being accessible to consumers (Apple's AirPort routers alone showed up in 1999)
However on a technical level this began to create severe issues. The internet as it was originally designed assumed simple "end-to-end" connectivity. Every computer on the internet could (more or less) talk to another computer without exception.
<big>'''This created two major problems:'''</big>
The first one was IP exhaustion. Even by the 1990's there was an understanding that there simply wouldn't be enough IP addresses for everyone on the internet. This needed to be fixed, and fast! This lead to IPv6 as an evolutionary upgrade (a problem the internet still struggles to even deploy in 2025, despite being ratified in 1998)
The second, and much more obvious problem was security. By the year 2000 it was obviously apparent that every machine being able to talk to every other machine on Earth was a problem. Particularly when the dominant operating system these machines ran was what could be charitably described as..."not great" in terms of security. In the 2000's this would only escalate as the "[[wikipedia:ILOVEYOU|ILOVEYOU]]" worm gave way to some of Windows XP's greatest hits, [[wikipedia:Blaster_(computer_worm)|Blaster]], [[wikipedia:Sasser_(computer_worm)|Sasser]], [[wikipedia:Mydoom|Mydoom]], [[wikipedia:Nimda|Nimda]] and [[wikipedia:Conficker|Conficker]]. Among others.
A remedy proposed in the 1990's to the issue of IP exhaustion was "Network Address Translation" or "NAT". In layman terms this allows a bunch of computers to all sit behind a single IP address using a device such as a router. This technology is so ubiquitous that even in 2025 at time of writing it's still the defacto standard for home and business computers and other devices to access the modern internet.
'''''However,''''' this technology came at a cost. The internet as most folks imagine (or remember it) was originally built on the idea that every computer had its own, unique, IP address. NAT broke that assumption. And, in doing so, programs broke. Sometimes completely with services like FTP, sometimes in subtle ways. Like being unable to connect certain game players in a StarCraft lobby.
The problem that NAT introduced was that while "outbound" traffic would work fine. Such as you connecting to a website. If a program needed to ''receive'' data on your local computer, it could no longer simply sit and wait for a connection from a remote PC. An example would be AOL Instant Messenger (AIM). Chats between users are routed through a remote server. You and the Other User talk to a central server and it handles sending messages to-and-fro. ''However'' to save on bandwidth, sending files happens directly between users. If either user is behind NAT. They won't be able to "see" the remote computer and send data to it as desired.
The "solution" to this problem is known as '''''Port Forwarding'''''. You tell your router that [these ports] *always* go to [this IP address on the LAN] exclusively. This (mostly) solved the problem at the time. Additional solutions were proposed such as "UPnP" to allow programs to ask the router to forward ports for them dynamically. However, support for this was few-and-far-between (mostly BitTorrent clients) and in time it faded into oblivion.
As stated before, we live at the end of history. Which means we have the benefit of looking back on what was, and understanding the flaws. Which (finally) brings us to the point of this wiki page.
=== Okay but what does that have to do with CGHMN? ===
Every CGHMN user is allocated a /24 block of IP's. Effectively every user has 253 IP addresses to use as they'd like. This was a deliberate decision both to maximize the amount of freedom users would have to connect ALL their retro equipment if desired, and to try and allow direct end-to-end connectivity that the old web "expects"
'''''However''''' because we have the benefit of historical hindsight. Having directly allocated IP addresses does not mean that your devices are directly exposed to the network. By default (if using OpenWRT with Snep's setup script) your IP block will be ''firewalled'' against incoming connections. This is a necessary security measure because the very nature of the
=== So, what stuff breaks, exactly? ===
There's no definitive list of "what" breaks under this decision. A broad (but by no means encompassing) list of things that ''won't work'' are
- Servers. You won't be able to run any kind of server or service (EG: hosting your own website, running a game server) without the ability for users to connect to it
- Games that '''''don't''''' use a server browser. Games like Quake or Halo where users all connect to a single server to play on will work (provided the server is either port forwarded or the firewall is disabled) but other games such as StarCraft or Command & Conquer have players connect dynamically connect to a single player as the "host" (typically the player that created the game lobby). These will not work
- FTP! FTP is such an old protocol that the '''''remote server''''' initiates a connection back to the client and then begins sending files that way. This was fixed in [https://datatracker.ietf.org/doc/html/rfc1579 RFC 1579] with the "Firewall-Friendly FTP" proposal. Unfortunately despite being proposed in February 1994, some software such as Microsoft FrontPage did not enable it until 2003(!)
- AIM file transfers. As described already on this wiki page, AIM (and IRC and other chat clients such as MSN or Yahoo) all use a direct connection between two computers to send files across a network
=== How do I opt-out out? ===
<br>
<br>
<big>'''It should be made completely clear that opting out of using the OpenWRT firewall is not a decision that should be made lightly. We cannot explicitly guarantee that a user won't accidentally (or intentionally) release a malware Pandora's Box on the network. Blaster/Sasser/Mydoom/ILOVEYOU/etc are still real malware samples that can be downloaded and executed either by mistake or by a malicious user. We highly recommend installing any and all software patches that were (or are) available for your chosen systems before doing this!'''</big>
There are two "modes" of opt-out available. Depending on user preference.
The most drastic is simply to disable OpenWRT's firewall completely. This means any machine you plug in will have direct access to the network and any other devices on the network will be able to directly access it. If you choose this option we highly recommend putting any machines behind a (preferably modern!) Firewall and then port forwarding as necessary
The other option is to set a static (fixed) IP address on the device you want to run servers or play games from. Once this is done you can access the OpenWRT Firewall page (Network -> Firewall) and manually forward the required ports for that specific host.
06a4bf66b506a982bd7cf8e4ff8531c44a037087
298
297
2025-10-26T23:36:29Z
CursedSilicon
1
wikitext
text/x-wiki
=== A brief history on how the internet worked in the 1990's ===
[[Compu-Global-Hyper-Mega-Net|Compu-Global-Hyper-Mega-Net (CGHMN)]] exists in a difficult kind of space. We aim to emulate "the old web". A time of roughly "1995 to around 2005 or so". A sort of nebulous "Before Web 2.0 took off" kind of period. Though, really we support anything that speaks ethernet and (usually) TCP/IP. We've had devices as old as a DOS 286 PC clone connected successfully. Most users trend toward Windows XP as their platform of choice due to its relative flexibility and widespread hardware and software support
Unfortunately for all of us we live at the "[[wikipedia:End_of_history|end of history]]". In 1995 the "World Wide Web" was in its infancy in such a way that every single year brought quantum technological leaps over the previous year. By the end of the millennium we'd gone from rudimentary analog Dial-Up services to ''Wireless Networking'' being accessible to consumers (Apple's AirPort routers alone showed up in 1999)
However on a technical level this began to create severe issues. The internet as it was originally designed assumed simple "end-to-end" connectivity. Every computer on the internet could (more or less) talk to another computer without exception.
<big>'''This created two major problems:'''</big>
The first one was IP exhaustion. Even by the 1990's there was an understanding that there simply wouldn't be enough IP addresses for everyone on the internet. This needed to be fixed, and fast! This lead to IPv6 as an evolutionary upgrade (a problem the internet still struggles to even deploy in 2025, despite being ratified in 1998)
The second, and much more obvious problem was security. By the year 2000 it was obviously apparent that every machine being able to talk to every other machine on Earth was a problem. Particularly when the dominant operating system these machines ran was what could be charitably described as..."not great" in terms of security. In the 2000's this would only escalate as the "[[wikipedia:ILOVEYOU|ILOVEYOU]]" worm gave way to some of Windows XP's greatest hits, [[wikipedia:Blaster_(computer_worm)|Blaster]], [[wikipedia:Sasser_(computer_worm)|Sasser]], [[wikipedia:Mydoom|Mydoom]], [[wikipedia:Nimda|Nimda]] and [[wikipedia:Conficker|Conficker]]. Among others.
A remedy proposed in the 1990's to the issue of IP exhaustion was "Network Address Translation" or "NAT". In layman terms this allows a bunch of computers to all sit behind a single IP address using a device such as a router. This technology is so ubiquitous that even in 2025 at time of writing it's still the defacto standard for home and business computers and other devices to access the modern internet.
'''''However,''''' this technology came at a cost. The internet as most folks imagine (or remember it) was originally built on the idea that every computer had its own, unique, IP address. NAT broke that assumption. And, in doing so, programs broke. Sometimes completely with services like FTP, sometimes in subtle ways. Like being unable to connect certain game players in a StarCraft lobby.
The problem that NAT introduced was that while "outbound" traffic would work fine. Such as you connecting to a website. If a program needed to ''receive'' data on your local computer, it could no longer simply sit and wait for a connection from a remote PC. An example would be AOL Instant Messenger (AIM). Chats between users are routed through a remote server. You and the Other User talk to a central server and it handles sending messages to-and-fro. ''However'' to save on bandwidth, sending files happens directly between users. If either user is behind NAT. They won't be able to "see" the remote computer and send data to it as desired.
The "solution" to this problem is known as '''''Port Forwarding'''''. You tell your router that [these ports] *always* go to [this IP address on the LAN] exclusively. This (mostly) solved the problem at the time. Additional solutions were proposed such as "UPnP" to allow programs to ask the router to forward ports for them dynamically. However, support for this was few-and-far-between (mostly BitTorrent clients) and in time it faded into oblivion.
As stated before, we live at the end of history. Which means we have the benefit of looking back on what was, and understanding the flaws. Which (finally) brings us to the point of this wiki page.
=== Okay but what does that have to do with CGHMN? ===
Every CGHMN user is allocated a /24 block of IP's. Effectively every user has 253 IP addresses to use as they'd like. This was a deliberate decision both to maximize the amount of freedom users would have to connect ALL their retro equipment if desired, and to try and allow direct end-to-end connectivity that the old web "expects"
'''''However''''' because we have the benefit of historical hindsight. Having directly allocated IP addresses does not mean that your devices are directly exposed to the network. By default (if using OpenWRT with Snep's setup script) your IP block will be ''firewalled'' against incoming connections. This is a necessary security measure because because of the very nature of "running a retro network". Connecting machines that are (likely) un-patched would make them immediately vulnerable to attack. Even before they're properly configured for service by the end user.
=== So, what stuff breaks, exactly? ===
There's no definitive list of "what" breaks under this decision. A broad (but by no means encompassing) list of things that ''won't work'' are
- Servers. You won't be able to run any kind of server or service (EG: hosting your own website, running a game server) without the ability for users to connect to it
- Games that '''''don't''''' use a server browser. Games like Quake or Halo where users all connect to a single server to play on will work (provided the server is either port forwarded or the firewall is disabled) but other games such as StarCraft or Command & Conquer have players connect dynamically connect to a single player as the "host" (typically the player that created the game lobby). These will not work
- FTP! FTP is such an old protocol that the '''''remote server''''' initiates a connection back to the client and then begins sending files that way. This was fixed in [https://datatracker.ietf.org/doc/html/rfc1579 RFC 1579] with the "Firewall-Friendly FTP" proposal. Unfortunately despite being proposed in February 1994, some software such as Microsoft FrontPage did not enable it until 2003(!)
- AIM file transfers. As described already on this wiki page, AIM (and IRC and other chat clients such as MSN or Yahoo) all use a direct connection between two computers to send files across a network
=== How do I opt-out out? ===
<br>
<br>
<big>'''It should be made completely clear that opting out of using the OpenWRT firewall is not a decision that should be made lightly. We cannot explicitly guarantee that a user won't accidentally (or intentionally) release a malware Pandora's Box on the network. Blaster/Sasser/Mydoom/ILOVEYOU/etc are still real malware samples that can be downloaded and executed either by mistake or by a malicious user. We highly recommend installing any and all software patches that were (or are) available for your chosen systems before doing this!'''</big>
There are two "modes" of opt-out available. Depending on user preference.
The most drastic is simply to disable OpenWRT's firewall completely. This means any machine you plug in will have direct access to the network and any other devices on the network will be able to directly access it. If you choose this option we highly recommend putting any machines behind a (preferably modern!) Firewall and then port forwarding as necessary
The other option is to set a static (fixed) IP address on the device you want to run servers or play games from. Once this is done you can access the OpenWRT Firewall page (Network -> Firewall) and manually forward the required ports for that specific host.
c40314fc94117a747b1195d0f2b436dc63130c38
299
298
2025-10-27T12:30:06Z
Snep
5
Small adjustment in the last sentence on how to allow inbound ports for clearer instructions on where to set up the rules
wikitext
text/x-wiki
=== A brief history on how the internet worked in the 1990's ===
[[Compu-Global-Hyper-Mega-Net|Compu-Global-Hyper-Mega-Net (CGHMN)]] exists in a difficult kind of space. We aim to emulate "the old web". A time of roughly "1995 to around 2005 or so". A sort of nebulous "Before Web 2.0 took off" kind of period. Though, really we support anything that speaks ethernet and (usually) TCP/IP. We've had devices as old as a DOS 286 PC clone connected successfully. Most users trend toward Windows XP as their platform of choice due to its relative flexibility and widespread hardware and software support
Unfortunately for all of us we live at the "[[wikipedia:End_of_history|end of history]]". In 1995 the "World Wide Web" was in its infancy in such a way that every single year brought quantum technological leaps over the previous year. By the end of the millennium we'd gone from rudimentary analog Dial-Up services to ''Wireless Networking'' being accessible to consumers (Apple's AirPort routers alone showed up in 1999)
However on a technical level this began to create severe issues. The internet as it was originally designed assumed simple "end-to-end" connectivity. Every computer on the internet could (more or less) talk to another computer without exception.
<big>'''This created two major problems:'''</big>
The first one was IP exhaustion. Even by the 1990's there was an understanding that there simply wouldn't be enough IP addresses for everyone on the internet. This needed to be fixed, and fast! This lead to IPv6 as an evolutionary upgrade (a problem the internet still struggles to even deploy in 2025, despite being ratified in 1998)
The second, and much more obvious problem was security. By the year 2000 it was obviously apparent that every machine being able to talk to every other machine on Earth was a problem. Particularly when the dominant operating system these machines ran was what could be charitably described as..."not great" in terms of security. In the 2000's this would only escalate as the "[[wikipedia:ILOVEYOU|ILOVEYOU]]" worm gave way to some of Windows XP's greatest hits, [[wikipedia:Blaster_(computer_worm)|Blaster]], [[wikipedia:Sasser_(computer_worm)|Sasser]], [[wikipedia:Mydoom|Mydoom]], [[wikipedia:Nimda|Nimda]] and [[wikipedia:Conficker|Conficker]]. Among others.
A remedy proposed in the 1990's to the issue of IP exhaustion was "Network Address Translation" or "NAT". In layman terms this allows a bunch of computers to all sit behind a single IP address using a device such as a router. This technology is so ubiquitous that even in 2025 at time of writing it's still the defacto standard for home and business computers and other devices to access the modern internet.
'''''However,''''' this technology came at a cost. The internet as most folks imagine (or remember it) was originally built on the idea that every computer had its own, unique, IP address. NAT broke that assumption. And, in doing so, programs broke. Sometimes completely with services like FTP, sometimes in subtle ways. Like being unable to connect certain game players in a StarCraft lobby.
The problem that NAT introduced was that while "outbound" traffic would work fine. Such as you connecting to a website. If a program needed to ''receive'' data on your local computer, it could no longer simply sit and wait for a connection from a remote PC. An example would be AOL Instant Messenger (AIM). Chats between users are routed through a remote server. You and the Other User talk to a central server and it handles sending messages to-and-fro. ''However'' to save on bandwidth, sending files happens directly between users. If either user is behind NAT. They won't be able to "see" the remote computer and send data to it as desired.
The "solution" to this problem is known as '''''Port Forwarding'''''. You tell your router that [these ports] *always* go to [this IP address on the LAN] exclusively. This (mostly) solved the problem at the time. Additional solutions were proposed such as "UPnP" to allow programs to ask the router to forward ports for them dynamically. However, support for this was few-and-far-between (mostly BitTorrent clients) and in time it faded into oblivion.
As stated before, we live at the end of history. Which means we have the benefit of looking back on what was, and understanding the flaws. Which (finally) brings us to the point of this wiki page.
=== Okay but what does that have to do with CGHMN? ===
Every CGHMN user is allocated a /24 block of IP's. Effectively every user has 253 IP addresses to use as they'd like. This was a deliberate decision both to maximize the amount of freedom users would have to connect ALL their retro equipment if desired, and to try and allow direct end-to-end connectivity that the old web "expects"
'''''However''''' because we have the benefit of historical hindsight. Having directly allocated IP addresses does not mean that your devices are directly exposed to the network. By default (if using OpenWRT with Snep's setup script) your IP block will be ''firewalled'' against incoming connections. This is a necessary security measure because because of the very nature of "running a retro network". Connecting machines that are (likely) un-patched would make them immediately vulnerable to attack. Even before they're properly configured for service by the end user.
=== So, what stuff breaks, exactly? ===
There's no definitive list of "what" breaks under this decision. A broad (but by no means encompassing) list of things that ''won't work'' are
- Servers. You won't be able to run any kind of server or service (EG: hosting your own website, running a game server) without the ability for users to connect to it
- Games that '''''don't''''' use a server browser. Games like Quake or Halo where users all connect to a single server to play on will work (provided the server is either port forwarded or the firewall is disabled) but other games such as StarCraft or Command & Conquer have players connect dynamically connect to a single player as the "host" (typically the player that created the game lobby). These will not work
- FTP! FTP is such an old protocol that the '''''remote server''''' initiates a connection back to the client and then begins sending files that way. This was fixed in [https://datatracker.ietf.org/doc/html/rfc1579 RFC 1579] with the "Firewall-Friendly FTP" proposal. Unfortunately despite being proposed in February 1994, some software such as Microsoft FrontPage did not enable it until 2003(!)
- AIM file transfers. As described already on this wiki page, AIM (and IRC and other chat clients such as MSN or Yahoo) all use a direct connection between two computers to send files across a network
=== How do I opt-out out? ===
<br>
<br>
<big>'''It should be made completely clear that opting out of using the OpenWRT firewall is not a decision that should be made lightly. We cannot explicitly guarantee that a user won't accidentally (or intentionally) release a malware Pandora's Box on the network. Blaster/Sasser/Mydoom/ILOVEYOU/etc are still real malware samples that can be downloaded and executed either by mistake or by a malicious user. We highly recommend installing any and all software patches that were (or are) available for your chosen systems before doing this!'''</big>
There are two "modes" of opt-out available. Depending on user preference.
The most drastic is simply to disable OpenWRT's firewall completely. This means any machine you plug in will have direct access to the network and any other devices on the network will be able to directly access it. If you choose this option we highly recommend putting any machines behind a (preferably modern!) Firewall and then port forwarding as necessary
The other option is to set a static (fixed) IP address on the device you want to run servers or play games from. Once this is done you can access the OpenWRT Firewall page (Network -> Firewall -> Traffic Rules) and manually allow the required ports for that specific host to pass the firewall.
009093b444359470ea5233826202950339350d6a